Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (1,511)
  • 2020-2024  (1,511)
  • Instructional films  (1,511)
Datasource
  • MPI Ethno. Forsch.  (1,511)
  • BSZ  (1)
  • GBV  (1)
Material
Language
Years
Year
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc.
    Language: Undetermined
    Pages: 1 online resource (1 video file)
    DDC: 006.7/8
    Keywords: Amazon Web Services (Firm) Study guides Examinations ; Web services Study guides Examinations ; Cloud computing Study guides Examinations ; Electronic data processing personnel Certification ; Services Web ; Examens ; Guides de l'étudiant ; Infonuagique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Unlock your full potential of the AWS cloud and take your career to new heights with our comprehensive AWS Solutions Architect Associate Certification Video Course Series! Professionals who can design effective cloud solutions with AWS technologies are some of the most sought-after in today's IT industry, but AWS is challenging to learn with its vast ecosystem of capabilities. Getting certified as a Solutions Architect Associate is one of the best ways to review the latest concepts and best practices while validating your skills and knowledge of all that AWS has to offer. This video course series covers the four domains of the AWS Solutions Architect Associate exam. The first course in this series focuses on Domain #1, Design Secure Architecture. To prepare for this domain, you'll learn about things like encryption, identity and access management, the AWS Shared Responsibility model, and more. By the end of this course, you'll be equipped with strategies for securing your data, workloads, and applications with the right AWS resources and best practices. Through step-by-step guidance, invaluable exam tips, and dozens of quiz questions, AWS-certified expert Mark Wilkins will help you prepare to ace the AWS Solutions Architect Associate exam. Follow along in this course at your own pace and embark on your journey toward cloud excellence! What you'll learn and how you can apply it Understand the basic principles of securing access to AWS resources. Identify and evaluate different methods of access control available on AWS, including AWS Identity and Access Management (IAM), Security Groups, and Network Access Control Lists (NACLs). Apply best practices for securing access to AWS resources, including the principle of least privilege and the use of multi-factor authentication (MFA). Design and implement a secure access control strategy for AWS resources, including creating and managing IAM users, groups, and policies, configuring Security Groups and NACLs, and utilizing AWS Key Management Service (KMS) for secure key storage and management. Understand the basic principles of designing secure workloads and applications on AWS. Identify and evaluate different security mechanisms and services available on AWS, including Amazon GuardDuty, AWS WAF, AWS Shield, and AWS Firewall Manager. Design and implement a secure workload and application architecture on AWS, including utilizing AWS security services, implementing access control and authorization mechanisms, and performing security assessments and testing. Monitor and troubleshoot the security of workloads and applications on AWS, including identifying and resolving security incidents, implementing compliance and governance policies, and ensuring continuous security improvements. Understand the importance of data security controls in protecting sensitive data stored and processed on AWS. Identify the various types of data security controls available on AWS, including encryption, access control, monitoring, and auditing. Evaluate the appropriate data security controls needed based on the specific data and application requirements, compliance regulations, and organizational policies. Design and implement data encryption strategies for data at rest and data in transit using AWS services, such as AWS Key Management Service (KMS), Amazon S3 Server-Side Encryption, and AWS Certificate Manager. This course is for you because... You're a software engineer or architect looking to expand your career in the cloud. You have some experience in a cloud role, and would like to advance your career as a cloud solutions architect. You're an experienced Solutions Architect, DevOps or Systems Engineer, Technical Project Manager, or an Enterprise or Solutions Architect who wants to gain proficiency in AWS cloud solutions. Prerequisites: Understanding of cloud computing concepts, including the difference between public, private, and hybrid clouds. Familiarity with AWS services and tools, including compute, storage, database, and networking services, as well as management tools like AWS Management Console and the AWS CLI would be helpful. Basic knowledge of networking concepts, including IP addressing, subnets, routing, and security. Security and Compliance: Understanding of security and compliance best practices, including data encryption, and access control.
    Note: Machine-generated record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884348 , 1835884342
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an understanding of software security fundamentals, where you'll grasp the importance of secure coding practices and the repercussions of negligence. As you progress, you'll tackle real-world scenarios, learning to identify vulnerabilities and employ strategies to mitigate risks. The course focuses on the hands-on application of security principles, from initial software design to post-deployment checks, ensuring you're adept at protecting applications against modern threats. You'll dive into the OWASP Top Ten, encryption, and secure session management, gaining the foresight to preempt security breaches. The course wraps up by honing your skills in error handling, testing for security, and effective logging, transforming you into an invaluable asset for any development team focused on creating cyber-secure applications. What you will learn Implement secure password protocols Employ encryption for data security Design software with security in mind Apply OWASP security standards Execute thorough security testing Monitor applications against threats Audience The course is ideal for software developers and coders keen to specialize in secure application development. A foundational understanding of programming and basic security concepts is recommended. Perfect for those who aim to integrate top-notch security measures into their development processes. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835882047 , 1835882048
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 11 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco IOS ; Computer networks Study guides Design ; Examinations ; Electronic data processing personnel Certification ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of enterprise network design, introducing high availability techniques and WLAN deployment options. You'll compare on-premises and cloud solutions, gaining insights into the complexities of modern networking. The journey includes learning about SD-WAN, SD-Access, and QoS, enhancing your network performance skills. Focusing on advanced topics, you'll delve into Cisco Express Forwarding, device and path virtualization technologies like GRE and IPsec, essential for secure network architecture. The course also covers LISP, VXLAN, and VTP, crucial for network scalability. Troubleshooting techniques form a key part of the curriculum, addressing challenges in 802.1Q, EtherChannel, and more. You'll gain expertise in routing protocols such as OSPF and BGP, crucial for enterprise networking. The course also covers wireless networking fundamentals, NTP, NAT/PAT, and FHRP. Wrapping up, the course dives into network security and automation, including REST API security and orchestration tools, equipping you for the dynamic field of enterprise networking. This comprehensive course prepares you for navigating complex network environments and emerging technologies. What you will learn Grasp enterprise network design fundamentals Learn WLAN deployment strategies Compare on-prem and cloud network deployments Deepen knowledge of Quality of Service (QoS) Explore Cisco Express Forwarding techniques Develop troubleshooting skills for network issues Audience This course is ideal for network professionals and enthusiasts seeking advanced skills in enterprise networking. Prior knowledge of basic networking concepts and familiarity with Cisco's network environment is recommended. This course is perfect for those looking to deepen their understanding of Cisco's enterprise solutions. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884089 , 1835884083
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/82
    Keywords: Google (Firm) ; Electronic data processing personnel Study guides Certification ; Cloud computing Study guides Examinations ; Software engineering ; Infonuagique ; Examens ; Guides de l'étudiant ; Génie logiciel ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the fundamentals of cloud computing and Google Cloud Platform, setting a strong foundation for understanding the GCP environment. You'll learn about setting up cloud projects and accounts, managing billing, and configuring the GCP Command Line Interface (CLI), providing you with essential skills for managing cloud resources effectively. The course focuses on practical applications, including using the GCP Pricing Calculator, planning and configuring compute and data storage resources, and managing network resources. You'll gain hands-on experience launching instances in Compute Engine and using the Cloud SDK, as well as understanding instance groups for load balancing and autoscaling. The course wraps up by covering advanced topics such as deploying and implementing Kubernetes Engine, serverless compute, and various data solutions. You'll learn about monitoring, logging, managing IAM, and using audit logs, equipping you with the skills needed to manage complex cloud infrastructures and ensure efficient, secure operations. What you will learn Understand cloud computing basics Set up GCP projects and accounts Manage cloud billing and expenses Configure and use GCP CLI Implement network resource strategies Deploy and monitor Kubernetes Engine apps Audience This course is ideal for IT professionals, system administrators, and developers looking to specialize in cloud computing. Basic knowledge of IT infrastructure and familiarity with cloud concepts is recommended. Perfect for those aspiring to become Google Cloud Certified Associate Cloud Engineers. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886328 , 1835886329
    Language: English
    Pages: 1 online resource (1 video file (48 hr., 19 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security Study guides Examinations ; Penetration testing (Computer security) Study guides Examinations ; Hacking Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Electronic data processing personnel Certification ; Hackers Study guides Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Tests d'intrusion ; Examens ; Guides de l'étudiant ; Piratage informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Pirates informatiques ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with fundamental cybersecurity concepts, paving the way for an extensive exploration of ethical hacking. It delves into attacker motives and the intricacies of various attack classifications, establishing a robust foundation in cybersecurity principles. The course then covers the entire spectrum of cyber threat landscapes, from information warfare to the Cyber Kill Chain. It discusses vital topics like risk management and cyber threat intelligence, equipping you with the skills to manage cyber threats efficiently. The course shifts its focus to advanced concepts such as the MITRE ATT&CK Framework, the Diamond Model of Intrusion Analysis, and the CEH Hacking Methodology, merging these with practical ethical hacking skills. You'll gain insights into the nuances of threat hunting, incident handling, and the role of machine learning and AI in cybersecurity. The course also addresses critical aspects of network and web security, including various scanning and enumeration techniques, vulnerability assessments, and countermeasures against common cyber threats. You'll also delve into specialized areas like mobile, IoT, and cloud security. The course concludes with an emphasis on the latest standards and regulations in cybersecurity, preparing you for the CEH certification and real-world cybersecurity challenges. What you will learn Navigate ethical hacking methodologies and frameworks Conduct comprehensive network and web security assessments Develop skills in mobile, IoT, and cloud security strategies Prepare for the CEH certification with practical insights and knowledge Utilize and analyze various cyber-attack classifications Implement effective threat hunting and incident management Audience This Certified Ethical Hacker course is designed to strengthen the practical knowledge of security officers, auditors, site administrators, and any professional focused on network security. It's an excellent fit for those responsible for safeguarding network infrastructure and keen to deepen their understanding of ethical hacking. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT. Sophie Goodwin: Sophie Goodwin is a Voice-Over talent. Her background spans over eight years as a film and voice talent, with experience in eLearning content, independent films, TV & web commercials, and video games. She joined ACI Learning while completing her BS in Telecommunication at the University of Florida. Apart from her work as an Edutainer, Sophie is also involved in other aspects of the entertainment industry. She is certified in (ISC)_ CC: Certified in Cybersecurity.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883747 , 1835883745
    Language: English
    Pages: 1 online resource (1 video file (15 hr., 7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/04
    Keywords: Project management Study guides Examinations ; Gestion de projet ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with the PMI framework, setting the stage for a deep dive into project management methodologies. It delves into the basics of the CAPM exam ensuring a solid foundation in project management principles. The course systematically explores the project management lifecycle, covering topics from project initiation to closure. It covers essential concepts such as risk planning, stakeholder management, and the critical path method, laying the groundwork for managing real-world projects effectively. As you advance, the focus shifts to Agile methodologies, including Scrum and Kanban, blending these with traditional project management approaches. You'll understand the dynamics of the project team, the importance of emotional intelligence, and effective communication management. The course also covers practical applications in predictive and adaptive project environments, quality and integration management, and comprehensive project planning. You'll also delve into advanced areas like earned value analysis and work breakdown structures. The course concludes with a focus on business analysis in various project management frameworks. The course prepares you for both the CAPM exam and real-world challenges, making it an essential resource for aspiring project managers. What you will learn Grasp PMI's approach to project management Learn and apply Scrum, SAFe, and Kanban in projects Develop and implement robust risk management strategies effectively Apply Emotional Intelligence in project leadership Master and apply essential project management tools Execute project plans using Agile methodologies Audience The course is ideal for students and professionals aiming to establish or advance their careers in project management. A basic understanding of management principles is beneficial. The course is perfect for those seeking to align their skills with PMI standards and adapt to Agile methodologies. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL® Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL® Expert v3, ITIL® 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835882825 , 183588282X
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/01
    Keywords: Six sigma (Quality control standard) ; Organizational effectiveness ; Lean manufacturing ; Six Sigma ; Efficacité organisationnelle ; Production allégée ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to Lean Six Sigma (LSS), unraveling its history and foundational concepts. It delves into identifying waste and defects, crucial in process improvement. The journey through the course includes a comprehensive look at project management techniques and the Plan-Do-Check-Act cycle, essential in LSS implementation. The course focuses on the five phases of LSS: Define, Measure, Analyze, Improve, and Control. Each phase is explored in depth, with multiple parts ensuring a thorough understanding. You'll learn about defining project goals, measuring process performance, analyzing data for insights, implementing improvements, and controlling future process performance. The course wraps up with strategic insights into achieving buy-in for LSS initiatives and preparing for the next steps in your LSS journey. By the end of the course, you'll have a holistic understanding of how LSS can drive significant improvements in any organization. What you will learn Identify and eliminate process waste Learn the Plan-Do-Check-Act cycle Control and sustain process gains Gain skills for securing project buy-in Explore LSS project management essentials Utilize tools for effective data analysis Audience This course is ideal for professionals seeking to improve process efficiency and quality. A basic understanding of business processes is beneficial. This course is perfect for those looking to align their skills with Lean Six Sigma methodologies and enhance their problem-solving abilities. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Terra Vanzant Stern, Phd: Dr Stern is a Six Sigma Master Black Belt and the principal of SSD Global Solutions, Inc. She has written several books and articles on problem solving, process improvement and leadership. Her most recent book, Lean and Agile Project Management was released as a second edition in May 2020. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885468 , 1835885462
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Security measures ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of the latest computing and networking trends, equipping you with insights into the evolving landscape of cybersecurity. It delves into the intricacies of identifying cyber threats and common attack techniques, providing you with a strong foundation in cybersecurity defense. The course focuses on building your expertise in network security, covering topics like Wi-Fi vulnerabilities, advanced persistent threats, routing protocols, network addressing, and more. You'll gain a deep understanding of Palo Alto Networks security solutions and their role in safeguarding modern networks. As the course progresses, you'll acquire practical knowledge of endpoint security, server and system administration, ITIL concepts, and Palo Alto Networks NGFW components. You'll also explore the essentials of Prisma Cloud, Prisma Access, Cortex XDR, and Cortex XSOAR. By the end of this course, you'll have the skills and knowledge needed to excel in Palo Alto Networks cybersecurity and contribute to the security and resilience of today's digital environments. What you will learn Identify computing and networking trends Describe cybersecurity threats and common attack techniques Identify Wi-Fi vulnerabilities and attacks Understand advanced persistent threats Learn networking security models and technologies Gain insights into data center, cloud, and DevOps security concepts Audience This course is ideal for anyone who wants to learn the fundamentals of cybersecurity so that they have the knowledge for an entry-level network security career. There is no pre-requisite required except for a desire to learn more about cybersecurity and Palo Alto Security solutions. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA. Mike Rodrick: Mike Rodrick, the host, has more than 15 years of IT instruction experience, including 10 years as a Microsoft Certified Trainer. Mike became an ITProTV Edutainer in 2014. Certifications: GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881828 , 1835881823
    Language: English
    Pages: 1 online resource (1 video file (18 hr., 26 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/3
    Keywords: VMware ; Virtual computer systems ; Cloud computing ; Systèmes virtuels (Informatique) ; Infonuagique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to basic virtualization concepts and the integration of vSphere in the SDDC and cloud infrastructure. It then progresses to the core of ESXi host architecture, including installation and configuration. You'll learn to utilize the DCUI and Host Client for effective ESXi host configuration, and delve into creating and provisioning virtual machines, along with an understanding of VMware Tools. The course focuses on essential networking concepts, guiding you through network configuration files, Network Manager CLI, and Network Time Protocol setups. You'll gain practical skills in NFS server and client configurations, exploring vSphere networking and storage vocabulary, creating VMFS and NFS datastores, and understanding multipathing. The course wraps up with a deep dive into vSphere security, including SELinux management and firewalld configuration. You'll also learn about virtual machine management, CPU and memory concepts in a virtualized environment, creating a vSphere DRS cluster, vSphere HA architecture, and updates using vSphere Lifecycle Manager, rounding out a complete skill set for managing vSphere environments. What you will learn Manage virtual machines and VMware Tools Configure and manage vSphere networks Implement vSphere storage solutions Secure vSphere environments effectively Utilize vSphere for virtual machine management Deploy and manage vSphere HA and DRS clusters Audience This course is ideal for IT professionals and system administrators aiming to specialize in virtualization with VMware vSphere 7. Knowledge of basic virtualization and networking concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Mike Rodrick: Mike Rodrick, the host, has more than 15 years of IT instruction experience, including 10 years as a Microsoft Certified Trainer. Mike became an ITProTV Edutainer in 2014. Certifications: GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881903 , 1835881904
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 11 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6/2
    Keywords: BGP (Computer network protocol) ; Routing (Computer network management) ; Computer networks ; BGP (Protocole de réseaux d'ordinateurs) ; Routage (Gestion des réseaux d'ordinateurs) ; Réseaux d'ordinateurs ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to BGP, explaining what it is and why it is essential in the networking landscape. You'll explore topics such as Autonomous System Numbers (ASNs), BGP attributes, and route selection. The course also covers advanced concepts like BGP route reflectors, communities, and route summarization. The course focuses on real-world scenarios and hands-on labs, ensuring you gain practical experience in configuring and managing BGP in different network environments. By the end of this course, you'll have the expertise to design, implement, and troubleshoot BGP networks effectively. Whether you're a network administrator, engineer, or IT professional, this course will enhance your networking skills and open new career opportunities in the field of advanced networking. What you will learn Understand BGP attributes and path selection Implement BGP route reflectors for efficient routing Utilize BGP communities for traffic management Explore route summarization techniques Optimize network resources with BGP Troubleshoot common BGP issues Audience This course is ideal for IT professionals, system administrators, and developers aiming to specialize in networking and BGP. Basic knowledge of networking concepts and familiarity with routing protocols is recommended. Perfect for those aspiring to enhance their networking skills and pursue advanced networking roles. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138297947 , 0138297940
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 29 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Python (Computer program language) ; Computer programming ; Web site development ; Web applications ; Python (Langage de programmation) ; Programmation (Informatique) ; Sites Web ; Développement ; Applications Web ; computer programming ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. 2.5 Hours of Video Instruction Explore Python's capabilities for Data Science and Machine Learning, the topics of greatest import these days in the tech world. Python has risen to popularity as one of the most versatile and beginner-friendly programming languages. Its simplicity, readability, and extensive libraries make it a powerful language for a wide variety of different domains. It's widely used in web development, data analysis, scientific computing, artificial intelligence, and automation. Python's versatility and large community support make it an excellent language to kickstart your programming journey. This course offers a hands-on approach to building your Python skills through a series of practical projects from scratch. Hone your expertise in areas such as data analysis, machine learning, web scraping, and more. Related Learning: Watch and learn from Shaun's other videos: Functional Programming Projects with Python 3 About the Instructor: Shaun is a Senior Software Developer who specializes in Full-stack development and Software Architecture. He manages teams of developers, as well as teaches many hundreds of thousands more how to create enterprise-ready applications. Shaun's online courses have over 300,000 learners largely because of his passion for development and his focus on helping people apply their programming skills in the real world. He is a life-long programmer and problem-solving addict whose goal is to help people solve meaningful problems by mastering the art of software development. Please don't hesitate to get in touch with him about any opportunities or if you'd like to stay up to date on his other courses and live trainings. Skill Level: Intermediate-Advanced What You Will Learn: Each project will include some different aspect of data science/ machine learning with Python that it will be both accessible and engaging while you advance your skill set. Perform Sentiment Analysis on real-world text Work with Image Recognition Tools Scrape Basic Data from Websites And much more! Who Should Take This Course: Job titles: Software developer, Data analyst/scientist, Machine Learning Engineer, Web Developer, DevOps Engineer. Course Requirements: Prerequisites: Python experience and app development background About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835887882 , 1835887880
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 18 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Computer security Study guides Examinations ; Computer networks Study guides Examinations ; Security measures ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Examens ; Sécurité ; Mesures ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the fundamentals of cybersecurity, setting the stage for a deep dive into the world of threat actors and their motives. As the curriculum unfolds, you'll explore the intricacies of attack vectors, network scanning, and vulnerability assessments, understanding their critical role in cybersecurity defense. The course focuses on equipping you with the tools for penetration testing, web application security, and the latest in exploitation frameworks. Practical knowledge is extended to mobile and wireless security challenges, ensuring a holistic skill set. The course wraps up with advanced techniques in incident response, anomaly detection, and the application of forensic concepts, preparing you for real-world cybersecurity challenges. What you will learn Conduct thorough vulnerability scans Execute advanced penetration tests Secure web and mobile applications Counteract wireless and network attacks Implement strategic incident response Apply forensic analysis techniques Audience The course is ideal for IT professionals aspiring to become cybersecurity experts. Familiarity with basic IT concepts and a passion for security are prerequisites. This course is an excellent match for those looking to specialize in incident response and threat management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884706 , 1835884709
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 40 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Computer networks Study guides Examinations ; Electronic data processing personnel Certification ; Routing (Computer network management) Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Routage (Gestion des réseaux d'ordinateurs) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a deep dive into advanced routing protocols and their troubleshooting. You'll explore Admin Distance, Route Maps, Loop Prevention, and the nuances of Routing Protocol Redistribution. The course then shifts to advanced concepts like Route Tagging, Filtering, and Policy-Based Routing, providing a practical understanding of network routing mechanisms. As the course progresses, you'll delve into OSPF and EIGRP, gaining insights into their operation and optimization in enterprise environments. BGP's intricate details, from peerings to path attributes, are unpacked, equipping you with skills to manage complex network infrastructures. The course also covers MPLS operations and Layer 3 VPNs, enhancing your understanding of modern networking technologies. The course concludes with a comprehensive look at network security and management. Topics like AAA, RBAC, and First Hop Security are thoroughly explored, alongside CoPP strategies to protect the network control plane. You'll also engage with IPv6 security, SNMP, Syslog, and Cisco DNA Center, ensuring your readiness for diverse network scenarios. What you will learn Troubleshoot advanced network scenarios Implement policy-based routing techniques Deploy and manage MPLS and DMVPN Enhance network security with AAA and CoPP Manage IPv6 first hop security features Apply effective strategies in network management Audience This course is ideal for network professionals seeking advanced skills in Cisco networks. The course is perfect for those aiming to enhance their expertise in network troubleshooting and management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883044 , 1835883044
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6076
    Keywords: Wireless communication systems ; Telecommunications engineers Certification ; Transmission sans fil ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an in-depth look at the Meraki Dashboard, introducing you to its intuitive interface for network management. You'll delve into the management structure, understand licensing considerations, and design enterprise wireless networks with Cisco Meraki. The course focuses on high-density wireless deployments, equipping you with the skills to handle crowded network environments effectively. Discover the power of Meraki's mesh deployment for extending network coverage effortlessly. You'll unbox and set up a Meraki MR56 Access Point, configure it within the Dashboard, and gain hands-on experience in monitoring and troubleshooting AP setups. Throughout the course, you'll understand why Cisco Meraki is essential for modern network management, and you'll follow a journey of practical learning, from initial setup to advanced troubleshooting. What you will learn Learn Cisco Meraki Wireless basics Implement high-density solutions Troubleshoot wireless networks Configure Cisco Meraki APs Ensure secure deployments Optimize wireless performance Audience This course is ideal for network administrators, IT professionals, and anyone looking to enhance their skills in Cisco Meraki wireless networking. A basic understanding of network concepts is recommended but not mandatory. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881309 , 1835881300
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 52 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Electronic data processing personnel Study guides Certification ; Examinations ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Certified Information Security Manager (CISM) certification is the pinnacle for individuals aspiring to excel in Information Security Management. This course empowers you to showcase your expertise in security practices and validates your knowledge in this critical domain. In this comprehensive course, embark on a journey through four key sections: Information Security Governance, Risk Management, Information Security Program Development, and Incident Management. Uncover essential strategies, frameworks, and techniques encompassing governance principles, risk assessment methodologies, security program construction, and incident handling practices. Explore how to integrate security requirements seamlessly into IT operations, align strategies with business objectives, and effectively manage and mitigate incidents. Understanding these domains isn't just about passing the CISM exam; it's about gaining expertise to excel in today's cybersecurity landscape. Delve into regulatory impacts, risk assessment methodologies, security policy development, and incident response strategies. Equip yourself to align security programs with business objectives, analyze emerging threats, and navigate incident categorization and post-incident reviews. What you will learn Integrate governance principles into operations effectively Manage security risks using robust assessment methodologies Implement incident management aligned with regulations Identify and categorize incidents for prompt resolution Create essential policies for organizational resilience Ace post-incident reviews for continuous improvement Audience This course is tailored for aspiring or current information security professionals aiming to pursue the Certified Information Security Manager (CISM) certification. Prerequisites for this course include a basic understanding of information security concepts and familiarity with IT governance frameworks. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL® Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL® Expert v3, ITIL® 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    [Place of publication not identified] : Pragmatic AI Solutions
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 35 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3
    Keywords: Artificial intelligence ; Natural language processing (Computer science) ; Intelligence artificielle ; Traitement automatique des langues naturelles ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Responsible Generative AI and Local LLMs Learning Generative AI During Live Coding This video series covers mastering the theory of Generative AI and using local LLMs like Mistral, llamafile, Candle, and Lorax. Lessons covered include: Profit Sharing Concepts Tragedy of the Commons Game Theory and Generative AI Perfect Competition Negative Externalities Fine-tuning Mistral with Ludwig Getting Started with llamafile Hello World in Candle Exploring Rust and Candle Transcribing Audio with Whisper Rust for LLMs Learning Objectives Learn about responsible and ethical uses of generative AI Getting hands-on with local LLMs like Mistral, llamafile, Candle, and Lorax Learning to build solutions by coding along during tutorials Learning the key syntax and features of the Rust Language Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification Rust Bootcamp Python Bootcamp Google Professional Machine Learning Engineer Course 2023 (Rough Draft) Rust Data Engineering Building with the GitHub EcoSystem: Copilot, CodeSpaces, and GitHub Actions Microsoft Azure Fundamentals (AZ-900) Certification Google Professional Cloud Architect Certification Course 2023 (Rough Draft) AWS Solutions Architect Professional (SAP-C02) 2023.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Computer software Development ; Artificial intelligence ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Observability is more difficult in the era of large language models, while insight into your code's behavior is increasingly more important. Join Sam Newman and Jessica Kerr for a discussion about the impact of AI on software production. They explore what happens when deterministic work (software development) meets nondeterministic work (GenAI) and examine some of the limitations of communicating with an AI at scale. This event is for anyone who builds or maintains software and is looking to better understand the intersection of GenAI and observability. What's New in Software Development gives you a chance to explore trending topics in software development and to hear from Sam and Jessica Kerr about software development, how to begin implementing AI tooling into your own work, and their own career journeys. They will spend a few minutes covering the trends that are influencing software development and then tell you what you need to know to stay ahead of the curve. What you'll learn and how you can apply it How to start thinking about integrating GenAI into your production lifecycle How to use observability to gain insight into how your code behaves in production This live course is for you because... You want to hear from Sam Newman and Jessica Kerr about how software development is changing. Recommended Follow-Up: Read Observability Engineering (book).
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881569 , 1835881564
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 36 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.7/1
    Keywords: Computer networks Study guides Examinations ; Routing (Computer network management) Study guides Examinations ; Internetworking (Telecommunication) Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Routage (Gestion des réseaux d'ordinateurs) ; Examens ; Guides de l'étudiant ; Interconnexion de réseaux (Télécommunications) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying the foundation of basic networking hardware, introducing you to pivotal networking models, and navigating through Layer 1 and 2 technologies. You will grasp the core responsibilities in networking, delve into network addressing, and learn to use basic network utilities efficiently. The course focuses on deepening your understanding of Cisco equipment and components, including detailed insights into Cisco port characteristics and memory functions. You'll gain hands-on experience in installing, operating, and troubleshooting Cisco devices, accessing the Cisco IOS, and mastering fundamental Cisco IOS commands. The course wraps up by teaching you advanced skills like upgrading Cisco IOS on routers, password recovery techniques, performing factory resets, and utilizing additional tools for comprehensive network management. Each step is designed to strengthen your proficiency in Cisco's cutting-edge routing and switching technologies. What you will learn Identify key networking hardware components Understand essential networking models Utilize basic Cisco IOS commands effectively Perform network troubleshooting using Windows Execute password recovery on Cisco routers Conduct factory resets on Cisco switches Audience This course is ideal for IT professionals, network engineers, and tech enthusiasts seeking to enhance their skills in Cisco routing and switching. This course is perfect for those aspiring to gain Cisco CCT Routing and Switching certification. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835464694 , 1835464696
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 44 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Application program interfaces (Computer software) ; Software architecture ; Python (Computer program language) ; Interfaces de programmation d'applications ; Architecture logicielle ; Python (Langage de programmation) ; APIs (interfaces) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course offers a detailed exploration of FastAPI, a cutting-edge Python framework for API development. The course starts with basic API and REST principles, quickly advancing to practical application for a thorough understanding of both theory and practice. The curriculum progresses logically, starting with the basics of FastAPI, including app setup, API routing, linting, and formatting. Participants will create a social media API, manage post and comments, and learn code organization with APIRouter, followed by practical testing experience using pytest. A significant portion of the course focuses on asynchronous databases, vital for scalable application development. It covers database setup, connection, and integration within FastAPI. The course also delves into Python logging techniques, crucial for debugging and monitoring FastAPI applications. It also covers user authentication, an essential element in modern web apps. It includes practical training on JWTs, password hashing, authentication management, and database user relationships, alongside addressing many-to-many database relationships and user email confirmation strategies. In later stages, the course addresses advanced topics like file uploads, background image generation tasks, and deployment methodologies, including continuous integration with GitHub Actions. What you will learn Build and structure a FastAPI application Implement and test RESTful APIs with FastAPI Manage asynchronous database operations Configure and utilize Python logging in FastAPI Secure applications with user authentication and JWTs Handle complex database relationships Deploy FastAPI applications and manage them effectively Audience This course is ideal for aspiring back-end developers, testers looking to integrate automation into their workflows, and front-end developers seeking a deeper understanding of server-side processes. This course will particularly benefit those with a basic grasp of programming and a desire to specialize in the fast-paced realm of web development, API construction, and database management using FastAPI. Prior programming experience in any language is recommended; beginners should consider a basic Python course first, as all required software is provided for free. About the Author Jose Salvatierra Fuentes: Jose, a passionate educator in the realm of coding and software development, has dedicated over 7 years to teaching online. He founded Teclado with a vision to democratize software development education, striving to ensure comprehensive understanding for his students. His approach makes learning coding a clear, rewarding journey, connecting the dots that once seemed obscure. Specializing in Python and JavaScript, Jose excels in web and backend development. He's proficient in various libraries and frameworks, including Flask, React, React Native, and AngularJS. His expertise extends to working with UNIX systems, MongoDB, PostgreSQL, and crafting advanced system architectures. Jose's commitment is to make the learning process both efficient and enjoyable, guiding students to mastery in software development.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888186 , 1835888186
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 35 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco Systems, Inc Study guides Examinations ; Computer networks Study guides Examinations ; Telecommunication Study guides Switching systems ; Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Télécommunications ; Systèmes de commutation ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an in-depth look at Cisco's NX-OS, laying a foundation for understanding data center environments. It progresses to OSPFv2 and OSPFv3, crucial for robust network communication, and explores Multi-Protocol BGP and PIM, key for scalable networks. Advanced network solutions like FHRPs, RSTP+, and LACP are covered, essential for network resilience. You'll delve into vPC, VXLAN, EVPN, and OTV, essential for network virtualization and overlay networks. The focus then shifts to Cisco ACI, introducing intent-based networking with Cisco APIC. Topics include ACI Access Policies, Tenant Policies, and Contracts. You'll learn about UCS Rack Servers, Blade Chassis, and delve into UCS Infrastructure and Network Management. The course includes insights on UCS Software Updates, NetFlow, SPAN, and Streaming Telemetry, crucial for network maintenance and troubleshooting. Wrapping up, the course covers Fibre Channel, Port Channels, Nexus Software Updates, and essentials of cloud computing with NIST 800-145, equipping you with the knowledge to handle modern data center demands. What you will learn Understand NX-OS and OSPF protocols Gain expertise in FHRPs and RSTP+ Learn advanced LACP and vPC DCCOR Explore VXLAN and EVPN technologies Grasp ACI Tenant Policies and Contracts Analyze packet flow and cloud concepts Audience This course is ideal for network professionals aiming to specialize in data center technologies. Prior knowledge of networking and basic Cisco concepts is recommended. This course is perfect for those seeking to align their skills with Cisco's advanced data center solutions and practices. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138298432 , 0138298432
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Python (Computer program language) ; Computer programming ; Python (Langage de programmation) ; Programmation (Informatique) ; computer programming ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884966 , 1835884962
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 14 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco IOS ; Computer networks Design ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an overview of Cisco Modeling Labs 2 (CML2) and its installation on Windows 10, macOS Catalina, and VMware ESXi. You'll delve into the essentials of CML2, exploring how to build and configure labs both through the graphical user interface (GUI) and the API. Learn to access CML2 using Telnet and SSH for efficient management. Discover the art of connecting your lab to the outside world and adding VIRL 1.x images to enhance your lab's capabilities. The course focuses on empowering you with hands-on skills in network modeling and simulation using CML2. You'll understand the importance of CML2 in network architecture and how it streamlines network design and testing. As the course progresses, you'll acquire the expertise needed to create and manage complex network scenarios, making you proficient in CML2. By the end, you'll have the knowledge and skills to use CML2 effectively in your networking projects. What you will learn Prepare for CML2 and its installation Build and configure labs using the GUI and API Access CML2 through Telnet and SSH Connect labs to external networks Enhance labs with VIRL 1.x images Gain proficiency in Cisco Modeling Labs 2 Audience This course is ideal for network architects, administrators, and professionals looking to enhance their skills in network modeling and simulation. Basic knowledge of networking concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (56 min.)) , sound, color.
    Edition: [First edition].
    DDC: 620.0068
    Keywords: Engineering Management ; Leadership ; Technology Management ; Ingénierie ; Gestion ; Leadership ; Technologie ; Gestion ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Join host Michael Lopp, senior vice president at Apple, and his guest Will Larson, chief technology officer at Carta, as they demystify engineering strategy and discuss how these critical documents are much easier to create--and to support--than most people appreciate. You'll explore the common reasons why many organizations do not have a formal engineering strategy and learn about a proven process for creating one. This event is for you if you want to better understand engineering strategy, learn best practices for making one, or help drive and support strategy in your organization. Tech Leadership Tuesday is a dynamic monthly live event that helps empower people and technology leaders to become more effective and successful in their leadership roles. Each episode delves into a relevant topic for engineering leaders and, through a conversation between a host and guest, you'll learn about common challenges, best practices, and lessons learned from the guest's experience. What you'll learn and how you can apply it The importance of having a written engineering strategy How to create an engineering strategy What to avoid when writing an engineering strategy This live course is for you because... You want to hear from Michael Lopp and Will Larson about creating and implementing engineering strategy. You want to learn how to draft an engineering strategy. Recommended follow-up: Read The Engineering Executive's Primer (early release book by Will Larson) Read The Art of Leadership (book by Michael Lopp) Take Executive Leadership Fundamentals in 60 Minutes (on-demand course with Karen Walker).
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835880180 , 1835880185
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 27 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/8
    Keywords: Internet of things Study guides Examinations ; Electronic data processing personnel Certification ; Computer networks Study guides Examinations ; Internet des objets ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by establishing a foundational understanding of IoT, addressing common terms, benefits, and challenges. It then transitions into an in-depth look at the physical and network components of IoT and Edge Computing, along with an exploration of Cloud Computing's role in IoT. This sets the stage for a comprehensive view of the IoT ecosystem, crucial for both newcomers and seasoned professionals. The course also delves into IoT market sectors, security, and privacy concerns, highlighting the importance of robust security measures and privacy protocols in the IoT sphere. This segment is particularly vital, considering the growing emphasis on data security in today's digital world. Additionally, the course discusses IoT safety and risk management strategies, equipping learners with the skills to navigate potential risks effectively. Concluding with a detailed walkthrough of the IoT Software Development Life Cycle, the course covers each phase from project initiation and planning to development, integration, and maintenance. This holistic approach ensures that learners are not only well-versed in theoretical aspects but also adept at applying these concepts in real-world scenarios, bridging the gap between learning and practical application. What you will learn Understand key IoT concepts and terminology Explore benefits and challenges of IoT Analyze IoT physical and network components Learn about Cloud Computing in IoT Address IoT security and privacy issues Manage risks in IoT environments Audience This course is ideal for professionals and enthusiasts looking to dive into the IoT world. A basic understanding of networking and computing is beneficial. Perfect for those seeking practical skills and comprehensive knowledge of IoT technologies and applications. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886922 , 1835886922
    Language: English
    Pages: 1 online resource (1 video file (20 hr., 14 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.7/1
    Keywords: Computer networks Study guides Examinations ; Routing (Computer network management) Study guides Examinations ; Internetworking (Telecommunication) Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Routage (Gestion des réseaux d'ordinateurs) ; Examens ; Guides de l'étudiant ; Interconnexion de réseaux (Télécommunications) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a deep dive into Cisco's networking environment, covering foundational concepts such as network component roles and the Cisco CLI. It progresses through network topology, IPv4 and IPv6 addressing, and essential networking principles like virtualization, wireless configurations, and switch functionalities. The course is designed to build a comprehensive understanding of network infrastructure and cybersecurity basics. Focusing on practical applications, you will gain hands-on experience in configuring and managing Cisco networks. The course emphasizes VLAN configuration, Interswitch connectivity, routing protocols, and network security implementations. Through real-world scenarios, you will explore DHCP, NTP, and DNS in network management, alongside configuring static and dynamic routing, understanding ACLs, and navigating network address translation. The course concludes with advanced topics in network management and security. The course also introduces network management automation, SDN architecture, and REST-based APIs application. This course will ensure you are well-equipped for intermediate to advanced roles in network administration and security, with a robust skill set for navigating complex networking environments. What you will learn Understand network component roles and functions Analyze different network topology characteristics Configure IPv4 and IPv6 addresses on devices Gain insights into wireless configuration and security Learn routing components and packet forwarding techniques Implement network security through ACLs and NAT Audience This course is ideal for aspiring network administrators, IT professionals, and students seeking foundational knowledge in networking. This course is perfect for those preparing for the Cisco CCNA (200-301) certification, aiming to acquire a comprehensive understanding of network security, protocols, and management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA. Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835885321 , 1835885322
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 39 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Systèmes d'exploitation (Ordinateurs) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to Linux, the powerful operating system that powers most servers and embedded systems worldwide. We explore the significance of Linux in today's tech-driven world, highlighting its use in everything from mobile phones to supercomputers. The journey continues with a deep dive into open-source software, illustrating how it fosters innovation and collaboration in the tech community. The course focuses on the Linux family tree, detailing the relationships and differences between distributions such as Debian, Ubuntu, RHEL, and CentOS. This section is vital for understanding the landscape of Linux distributions and selecting the right one for your needs. We also cover essential considerations for selecting compatible hardware, ensuring you can build or choose a system that runs Linux flawlessly. The course wraps up with practical skills, including installing Ubuntu and CentOS, using productivity suites, and navigating the Linux filesystem. You'll learn the basics of the terminal and shell, discover how to install software across different distributions, and manage user accounts and permissions. These skills are crucial for anyone looking to thrive in a tech environment powered by Linux.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835887042 , 183588704X
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Linux ; Computer networks Security measures ; Client/server computing ; Web servers ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Architecture client-serveur (Informatique) ; Serveurs Web ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course offers an in-depth exploration of Linux Security Techniques, guiding you through essential security measures to protect Linux environments. Starting with an overview of modern Linux distribution security features, it moves to practical applications such as managing logs with syslog and journald, auditing user passwords, and configuring firewalls for robust protection. Through hands-on examples, you'll learn to audit filesystems, secure services with SELinux, and isolate applications using chroot jails and LXC containers. The course emphasizes the importance of data security, introducing LUKS disk encryption and GPG for data-at-rest security. It concludes with practical network security strategies and essential security testing, including firewall configuration verification and network data encryption analysis with tools like Wireshark and TCPDUMP. This journey equips you with the skills to implement and verify comprehensive security measures, ensuring your Linux systems are safeguarded against evolving threats.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835889046 , 1835889042
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 57 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux Study guides Examinations ; Operating systems (Computers) Study guides Examinations ; Computer networks Study guides Examinations ; Electronic data processing personnel Certification ; Systèmes d'exploitation (Ordinateurs) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying a solid foundation with the installation and configuration of the BIND DNS server, moving on to the intricacies of creating forward and reverse lookup zones, which are pivotal for network navigation and management. It emphasizes the critical role DNS plays in network infrastructure, detailing troubleshooting techniques and ways to enhance mail server support through DNS configurations. It continues with securing BIND using DNSSEC, ensuring data integrity and authentication across the network. The course focuses on web server deployment and management, starting with Apache, which includes virtual server configuration, SSL encryption, and URL redirection, before transitioning to the Squid proxy server setup, user authentication, and access restrictions. It also covers Nginx for web serving and reverse proxy applications, highlighting its flexibility and efficiency. The course wraps up with an exploration of network file sharing and server management using Samba and NFS, DHCP server configuration, OpenLDAP for authentication, Postfix for SMTP services, and secure communications with OpenVPN and SSH. Additionally, it touches on firewall management with iptables, FTP server setup, and the importance of Fail2ban for security.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835462997 , 1835462995
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 55 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3
    Keywords: Artificial intelligence Study guides Examinations ; Microsoft Azure (Computing platform) Study guides Examinations ; Intelligence artificielle ; Examens ; Guides de l'étudiant ; Microsoft Azure (Plateforme informatique) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Dive into the world of Azure AI with our meticulously crafted video course, tailored to empower you with a thorough understanding of artificial intelligence fundamentals and its practical applications in the cloud. This course begins with an introduction to the AI-900 exam contents, guiding you through what to expect and how to prepare effectively. As you progress, you'll explore the distinctions between artificial intelligence, machine learning, and data science, and delve into common AI workloads, including machine learning and anomaly detection. The course also covers the application of AI within Microsoft Azure, addressing challenges, risks, and the principles of responsible AI use. Through detailed video content, you'll learn about Azure Machine Learning, Cognitive Services, and how to apply computer vision and natural language processing to solve real-world problems. The course culminates in practical advice on preparing for the AI-900 exam, featuring example questions and strategies for success. Whether you're a beginner or looking to solidify your knowledge, this course will take you on a journey from foundational concepts to advanced applications, ensuring you're well-prepared for the AI-900 certification.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881248 , 1835881246
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 59 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Web applications Security measures ; Tests d'intrusion ; Applications Web ; Sécurité ; Mesures ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of the foundational elements of web application infrastructure, introducing you to the critical aspects of URLs, HTTP Methods, and the underlying technologies that make the internet tick. You will gain a firm grasp on the workings of Web APIs, Content Management Systems, and Databases, setting the stage for more advanced topics. The course focuses on equipping you with the skills to identify, analyze, and exploit vulnerabilities within web applications. From exploring the use of powerful tools like Burp Suite and OWASP ZAP to understanding the intricacies of SQL Injection, XSS attacks, and CSRF (Cross-Site Request Forgery), you will journey through a curriculum designed to challenge and enhance their hacking capabilities. The course wraps up by delving into complex security issues such as JWT Attacks, IDOR, and SSRF, ensuring you emerge with a well-rounded mastery of web app pentesting. Throughout, the emphasis is on hands-on learning, providing you with the opportunity to apply concepts in real-world scenarios, thereby cementing your understanding and preparing you for professional success. What you will learn Conduct vulnerability scans with Nikto and Burp Suite Execute directory fuzzing with Feroxbuster Detect and exploit SQL injections using SQL Map Uncover and mitigate XSS vulnerabilities Safeguard against CSRF and SSRF threats Implement JWT attack strategies for security Audience This course is ideal for cybersecurity enthusiasts, IT professionals, and aspiring ethical hackers seeking to deepen their understanding of web app vulnerabilities. Familiarity with basic security concepts and experience with web technologies are recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (43 min.)) , sound, color.
    Edition: [First edition].
    DDC: 650.1
    Keywords: Success in business ; Leadership ; Time management ; Project management ; Succès dans les affaires ; Leadership ; Gestion du temps ; Gestion de projet ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Advancing in a large organization requires more than just being good at your job. Many of these skills and practices are not obvious and seldom taught. In teaching some of these practices, this course will help you learn how to better manage your time and relationships, find space to innovate, and take advantage of all the perks and benefits of working at a large company, so that you can not only survive but also thrive in your role. What you'll learn and how to apply it By the end of this course, you will have new tools and ways of thinking that will improve your daily outlook, give you more opportunities to advance, and avoid overwork at a large organization. This course is for you because You're new to working at a large company and want some tactics and practices to avoid making mistakes and having an unpleasant worklife. You want to become better at managing relationships and using your time wisely. You want to work on advancing your career and effectiveness at work. Prerequisites You're working in a large company Your job is focused on how the organization runs, either by helping management, being a manager, or aspiring to one of those roles.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888148 , 1835888143
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 46 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Software architecture ; Service-oriented architecture (Computer science) ; Architecture logicielle ; Architecture orientée service (Informatique) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Dive into the world of Docker, the pivotal tool in container technology, with our Docker Mastery course. Designed for beginners, this course guides you through the essentials of Docker, explaining its importance and how it revolutionizes deployment processes. Starting with an introduction to Docker and its ecosystem, you'll understand why Docker is a game-changer in software development and deployment. You'll set up your development environment, master Docker fundamentals through hands-on exercises, and learn to manage containers efficiently. The course progresses to more complex topics like Dockerfile, image publishing, Docker layers, caching, and Docker Compose for multi-tier applications. With a special focus on CI/CD using Docker, GitHub Actions, and AWS Elastic Beanstalk, you'll gain the skills to automate your deployment workflows, ensuring faster and more reliable releases. By the end, you'll have a solid foundation in Docker, ready to tackle real-world challenges and streamline your development pipeline. What you will learn Setup and manage your Docker development environment Run, stop, and manage containers and images efficiently Optimize Dockerfile for effective image creation and management Publish Docker images and explore Docker layers and caching Develop CI/CD pipelines with Docker, GitHub Actions, and AWS Deploy complex web applications using Docker Compose Audience This course targets aspiring DevOps professionals, software developers, system administrators, IT managers, QA engineers, and technology enthusiasts. Ideal for those aiming to refine development workflows, enhance application portability, and ensure project consistency using Docker. It's perfect for individuals responsible for efficient app deployment, scaling, and management, as well as QA professionals looking to improve testing accuracy. No Docker experience required; some programming knowledge preferred but not essential. About the Author Paulo Dichone: Paulo Dichone, a seasoned software engineer and AWS Cloud Practitioner, is renowned for his expertise in Android, Flutter, and AWS, as well as being a best-selling instructor. Paulo has successfully imparted his knowledge to over 200,000 students across 175 countries, specializing in mobile app development for Android and iOS, web development, and AWS Cloud. His teaching philosophy centers on empowering students to excel as developers and AWS cloud practitioners, regardless of their prior experience. Beyond his professional pursuits, Paulo is devoted to his family, enjoys playing the guitar and mandolin, and loves to travel. He is committed to guiding students to achieve their highest potential in the tech industry.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885406 , 1835885403
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 20 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux Study guides Examinations ; Electronic data processing personnel Certification ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the basics of Linux installation, ensuring you're well-equipped to set up Linux on both physical and virtual machines. It takes you through hardware detection and configuration, making sure your system is optimized for performance. You'll learn about the Linux boot process and how to configure GRUB, providing the knowledge needed to troubleshoot boot issues and understand system startup. The course focuses on the Linux shell, where you'll gain skills in managing processes and execution priorities, essential for maintaining a smooth and efficient system. Editing files with nano and vi is covered in detail, along with customizing the bash environment to streamline your workflow. You'll become proficient in managing files, redirecting data, and using powerful tools like grep to filter output, enhancing your day-to-day Linux administration tasks. The course wraps up by delving into advanced topics such as file permissions, ACLs, managing software with dpkg, apt, rpm, and yum, and understanding systemd for service management. Through practical exercises, you'll learn how to maintain filesystem health, manage disk utilization, and handle removable media, equipping you with the skills to manage Linux systems effectively. What you will learn Install Linux on VMs and hardware Detect and configure system hardware Manage boot processes and GRUB Utilize the Linux shell effectively Customize and optimize bash Handle file permissions and ownership Audience This course is ideal for aspiring system administrators, IT professionals, and tech enthusiasts looking to gain or enhance their Linux administration skills. Basic computer literacy and familiarity with operating systems are recommended to get the most out of this course. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Language: English
    Pages: 1 online resource (1 video file (54 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Computer software Development ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Join Michael Lopp and Tara Hernandez as they delve into developer productivity--what it is, why it's often misunderstood, and why it's such a hot topic right now. This event is for aspiring and active leaders who want to ensure that their teams are meeting their goals, have the tools they need to do their best work, and are able to communicate the value of their work to non-technical leadership. Viewers will gain insight into recent debates about measuring developer productivity, what qualitative and quantitative data shed the greatest light on productivity, and what steps they can take to foster an organizational culture that looks holistically at developer experience. Tech Leadership Tuesday is a dynamic monthly live event that helps empower people and technology leaders to become more effective and successful in their leadership roles. Each episode delves into a relevant topic for engineering leaders and, through a conversation between a host and guest, you'll learn about common challenges, best practices, and lessons learned from the guest's experience. What you'll learn and how you can apply it What's driving recent debates about developer productivity The role that developer productivity plays in engineering culture The business value of focusing on developer productivity and how you can measure ROI This live course is for you because... You want the chance to hear from Michael Lopp and Tara Hernandez about leadership and developer productivity. You're a leader and you want to learn to think more holistically about how to empower developers and deliver software faster. Recommended follow-up: Read Rethinking Productivity in Software Engineering (book) Read Efficiency vs. Effectiveness vs. Productivity (Chapter 2 from Leading Effective Engineering Teams) Please note that slides or supplemental materials are not available for download from this recording. Resources are only provided at the time of the live event.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883020 , 1835883028
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 59 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.693
    Keywords: Blender (Computer file) ; Three-dimensional display systems ; Computer graphics ; Affichage tridimensionnel ; Infographie ; three-dimensional ; computer graphics ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an essential overview, preparing you to dive into the world of Blender with a focus on lighting and compositing fundamentals. It progresses to cover lighting basics, where you'll learn to manipulate area, point, spot, and sunlight sources, and understand their properties for creating mood and atmosphere. The course focuses on Blender's Eevee renderer to teach ambient occlusion, bloom effects, and real-time rendering options, enhancing the visual fidelity of your projects. Advanced lessons explore techniques for reducing render times, exploring HDRI skybox lighting, and achieving stylistic effects with cell shading. The course wraps up with practical applications in night scene lighting, professional 3-point setups, interior and studio lighting configurations, and the intricacies of 3D environment presentation. By the end, you'll be equipped to add depth, realism, and emotion to your 3D scenes through proficient lighting and compositing. What you will learn Apply HDRI skyboxes for environmental lighting Utilize Eevee renderer for ambient and bloom effects Accelerate Blender render times efficiently Implement cell shading with Freestyle Light night scenes and create volumetric fog Set up professional 3-point lighting Audience This course is ideal for beginners and hobbyists eager to delve into 3D art, with a focus on lighting and compositing. No prior knowledge of Blender is required, making this course perfect for those new to 3D modeling and looking to enhance their visual storytelling skills. About the Author 3D Tudor By Neil Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. After attending the University for Creative Arts (UCA) for a BA (Hons) Computer Games Arts degree, Neil began freelancing. In 2019, Neil Bettison founded 3D Tudor, a YouTube channel, to help other game developers because of his passion for 3D modeling. Neil is an excellent tutor known for his concise instructions and expertise in Blender, Unreal Engine 5, and Unity. His to-the-point guidance and years of experience make him a valuable resource for learning particle effects, complex asset animation, and game development.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 21 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Dirty data is everywhere. Have you had a letter addressed to you with your name misspelled? That's dirty data. Do you have trouble finding a product on a website because it's not in the right category? That's dirty data. Do you have trouble finding a person or company name in your system because of a typo? That's dirty data. And it causes problems, lots of problems. Before software implementation, machine learning and AI, you need clean data. It's THE most important thing to fix before doing any of these things, and we're all expected to be able to clean or fix this data, yet no one tells us how to do it! Some of the most common data problems occur in name, address, email and phone number data, and this course will cover this off. While there are many data-cleaning tools out there, almost everyone uses Excel, including non-data professionals, and it's important to have the skills to be familiar with and be able to get to know your data before you use these tools. It's essential to be able to spot and fix errors in Excel first, and understand when the data isn't right so you know if you can trust those fancy tools or not! This course will help you achieve this and you'll learn: What is dirty data? The importance of data quality Tips for cleaning data in Excel How to clean names, addresses, emails and phone numbers in Excel You'll even get your own dirty data set to work on! This course is for you because... You have data quality issues in your organization and would like your team to understand the importance of data quality and how to improve it. You're a data professional spending a significant amount of time cleaning data and would like to work more efficiently. You're not a data professional, but work with data and want to work more efficiently with it. Prerequisites: Some experience of Excel would be beneficial.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835463376 , 1835463371
    Language: English
    Pages: 1 online resource (1 video file (7 hr., 3 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Sécurité informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with foundational security principles, introducing you to the landscape of digital threats, vulnerabilities, and the mechanisms behind cyber exploits. It delves into the importance of understanding and mitigating risks to minimize their impact on organizations and individuals. The course focuses on both the human and technical aspects of security, ranging from social engineering and physical security measures to the intricacies of browser and wireless security. It emphasizes the criticality of robust user authentication methods, comprehensive permissions, and stringent password policies to fortify defenses against unauthorized access. The course wraps up by exploring advanced concepts such as encryption, secure protocols, and network isolation, equipping you with the knowledge to implement effective security strategies and solutions. Throughout this journey, you'll gain insights into the significance of each topic in protecting information assets and ensuring the integrity of digital environments. What you will learn Understand core security principles Identify and mitigate digital risks Combat social engineering tactics Implement strong password policies Secure networks with firewalls Protect against malware threats Audience This course is ideal for IT professionals, system administrators, and cybersecurity enthusiasts seeking to bolster their knowledge of digital defense mechanisms. A fundamental understanding of computer networks and internet functionality is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT. Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835466124 , 1835466125
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 21 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Hacking ; Tests d'intrusion ; Piratage informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying the groundwork with breach scanning and enumeration, guiding learners through identifying vulnerabilities in network systems and web applications. It covers techniques such as Web App Enumeration, HTTPS analysis with Wireshark and Burp Suite, and POP3 Enumeration, setting the stage for deeper exploration into cybersecurity defenses. The course focuses on practical application, moving from theoretical concepts to real-world hacking techniques. Learners will navigate through gaining access, exploiting systems, and executing privilege escalations both horizontally and vertically. Scenarios involving systems like GoldenEye, Bob, and Straylight offer hands-on experience, emphasizing the attacker's perspective to fortify defense mechanisms. The course wraps up with advanced topics in exploit development and real-world applications, challenging learners to apply their knowledge in complex environments. From scanning and enumeration to gaining access and privilege escalation, learners will develop a solid foundation in hacking techniques and cybersecurity defense. This course not only equips technical professionals with essential skills but also empowers them to think like a hacker, a vital perspective in today's digital world. What you will learn Conduct breach scans and enumerations Analyze HTTPS traffic for vulnerabilities Utilize Burp Suite for web app security testing Execute horizontal and vertical privilege escalations Escape restricted shells for full system access Implement advanced server and client protection strategies Audience This course is ideal for cybersecurity enthusiasts, IT professionals, and ethical hackers looking to deepen their understanding of hacking techniques and security defenses. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886267 , 1835886264
    Language: English
    Pages: 1 online resource (1 video file (21 hr., 31 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.693
    Keywords: Blender (Computer file) ; Three-dimensional display systems ; Computer graphics ; Affichage tridimensionnel ; Infographie ; three-dimensional ; computer graphics ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course kicks off with an engaging introduction to Blender and its pivotal role in asset management, laying the groundwork for aspiring 3D artists to navigate the complexities of digital modeling. From the outset, learners are immersed in the Blender Basics Overview, accompanied by a rich Resource Pack, to swiftly get up to speed with the software's capabilities. Setting up new projects becomes second nature as participants explore the Blender Asset Manager, learning to store files efficiently and manage resources with precision. The course continues through the nuances of creating detailed 3D environments, leveraging greyboxing techniques, and applying lifelike textures and materials to bring scenes to life. Special emphasis is placed on generating creative references using AI, crafting natural elements with geometry nodes, and designing intricate architectural features that stand out in any portfolio. As the course progresses, learners delve into advanced modeling, lighting, and the art of texture application, culminating in a segment dedicated to rendering techniques that showcase their projects in the best light. By the end, participants are not just proficient in Blender; they are equipped with a holistic view of 3D design, enabling them to bring their creative visions to fruition. What you will learn Navigate Blender's interface and tools Create efficient asset management workflows Design 3D environments with advanced greyboxing Apply textures and materials for realism Construct architectural elements in Blender Model and texture dynamic 3D foliage Audience This course is ideal for 3D artists, designers, and enthusiasts looking to enhance their Blender skills. Prior basic knowledge of 3D concepts is helpful but not required. This course is perfect for those seeking to create professional 3D models and environments. About the Author 3D Tudor By Neil Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. After attending the University for Creative Arts (UCA) for a BA (Hons) Computer Games Arts degree, Neil began freelancing. In 2019, Neil Bettison founded 3D Tudor, a YouTube channel, to help other game developers because of his passion for 3D modeling. Neil is an excellent tutor known for his concise instructions and expertise in Blender, Unreal Engine 5, and Unity. His to-the-point guidance and years of experience make him a valuable resource for learning particle effects, complex asset animation, and game development.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    [Shelter Island, New York] : Manning Publications
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Kubernetes ; Application software Development ; Open source software ; Cloud computing ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Empower your team with platforms built on top of Kubernetes using open source tools. Adopting Kubernetes is complex--especially when you're working in an organization with multiple teams, deploying to multiple cloud providers, and working with different stacks. Platform Engineering on Kubernetes shows you how to solve these common cloud native problems with open-source tools and emerging best practices from the Kubernetes community. In Platform Engineering on Kubernetes you will learn about: The principles behind platform engineering and how these apply to Kubernetes Evaluating and adopting open-source projects to build domain specific platforms Creating Platform APIs to enable teams to release more software more efficiently Reducing the cognitive load of a platform for your teams Measuring your platform initiatives using established software delivery metrics Package, version, distribute, and deploy with Helm, Tekton, Dagger and Argo CD Implement a multi-cloud infrastructure strategy using Crossplane Progressive upgrades with Knative Serving and Argo Rollouts Enable development teams with standard application-level APIs with Dapr A platform helps your team stay focused on delivering amazing software. But building a reliable platform on top of Kubernetes demands real expertise. Platform Engineering on Kubernetes reveals how to combine multiple popular open-source projects into a custom platform that works for your applications and your teams. It's the perfect guide for your organization's journey to Kubernetes, simplifying cloud native development for your dev teams and helping them deliver software faster. About the Technology Kubernetes is an amazing orchestration tool, but it's just the start of your journey to the cloud. To efficiently deliver cloud-native software, your team needs a solid build pipeline, an efficient package manager and distribution mechanism, and APIs that reduce your team's cognitive load. This book will show you how to build custom platforms on top of Kubernetes--all with open-source tools such as Dapr, Knative, Argo CD and Rollouts, and Tekton. About the Book Platform Engineering on Kubernetes starts by clearly defining the elements of a great Kubernetes-based platform. Then, it systematically introduces the tools you'll need to build a platform that exactly matches your organization's requirements. Hands-on examples and detailed code guide you through each step. By the end, you'll be able to create a complete platform to efficiently deliver cloud-native software without being tied to a specific cloud provider or vendor. What's Inside Package, version, distribute, and deploy with Helm, Tekton, Dagger and Argo CD Implement a multi-cloud infrastructure strategy using Crossplane Progressive upgrades with Knative Serving and Argo Rollouts Enable development teams with standard application-level APIs with Dapr About the Reader For developers and software architects familiar with the basics of containers and Kubernetes. About the Author Mauricio Salatino is currently a Dapr OSS Contributor, a Knative Steering Committee member, and co-lead of the Knative Functions working group. Quotes An engaging and captivating hands-on exploration of the CNCF landscape through the prism of platform engineering. - Viktor Farcic, Upbound/DevOpsToolkit The book is a reflection of a mountain of personal experience and the author's own journey on the windy paths of cloud native. - Andreas Grabner, Dynatrace Brims with Mauricio's unique experience, insights, and deep understanding. - Thomas Vitale, Systematic For anyone looking to build a modern, cloud native development platform on Kubernetes. An indispensable guide. - Lance Ball, Red Hat A comprehensive exploration of platform engineering. - Carlos Santana, AWS.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Ever wondered how to transform numerical values into descriptive text? From accessing the Visual Basic Editor to customising the formula and adapting it for different currencies, this lesson will equip you with a quick and efficient way to convert numbers to words. Learn how to easily integrate VBA code into your Excel workbook, enabling you to convert numbers into words effortlessly with just a simple function. Say goodbye to tedious manual processes and embrace the efficiency of converting numbers to words in Excel.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (3 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Ever struggled with chaotic data columns? In this lesson, we share a quick Excel hack: skip manual dragging and dropping by using a numbering system. Assign a numerical order to columns, select your dataset, and opt for left-to-right sorting in the Data tab. Whether it's a compact sheet or a vast dataset, this method streamlines Excel data management and is guaranteed to save you time. Join us to learn this efficient trick for hassle-free column sorting. Enhance your data analysis workflow and leave behind the tedious task of manually rearranging columns in Excel.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.5
    Keywords: Microsoft Office ; Microsoft Outlook ; Microsoft SharePoint (Electronic resource) ; Microsoft Team manager ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This lesson explores how Outlook Groups, SharePoint, and Microsoft Teams can work together within the Microsoft 365 suite to simplify tasks and boost collaborative efficiency. We demonstrate how to create and manage a group directly from Outlook Online. Learn how to add members and utilise the unique group email address. Uncover the interconnected nature of Microsoft 365 applications and examine the synchronisation between Outlook and SharePoint, allowing you to manage and share documents within your team. Establish the time-saving benefits of using your Outlook group to create a team in Microsoft Teams, ensuring consistency across settings and members. Optimise your Microsoft 365 experience by understanding the seamless connection between features.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: In this lesson, we examine a common practice in Excel that might be holding you back: the SUMIF function. While SUMIF has been a favourite for many, we're here to introduce you to a more powerful alternative – the SUMIFS (plural!) function. The SUMIFS function not only replicates the capabilities of SUMIF but takes it a step further by accommodating multiple criteria seamlessly. No longer bound by the limitations of SUMIF, SUMIFS empowers you to handle complex conditions. Join us as we showcase how SUMIFS can efficiently replace SUMIF in both single and multiple-criterion scenarios. Embrace the efficiency, simplicity, and versatility of SUMIFS to revolutionise the way you approach data analysis.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This lesson will guide you through creating a dynamic and visually impressive conditional clustered column chart with a moving target line using Microsoft Excel. If you've ever wondered how to make your charts both informative and aesthetically pleasing, this one’s for you. Learn how to add extra columns strategically and use conditional formulas to highlight specific data points. By the end of this lesson, you'll have a visually appealing and insightful chart — demonstrating the power of conditional formatting and dynamic data visualisation in Excel.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (6 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This lesson covers data analysis and visualisation and confronts the challenge of deciphering a confusing sales chart. We'll explore the intricacies of data and the need for a strategic pivot table intervention. Explore various Excel table features and create a comprehensive PivotTable for a refined and organised dataset. The lesson presents solutions to technical challenges and provides a deeper understanding of data representation and manipulation. Learning Objectives Proficiently analyse and visualise data in Excel and master the use of pivot tables and line charts for effective data representation and manipulation.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.5/7
    Keywords: Microsoft Outlook ; Business Computer programs ; Time management ; Personal information management Computer programs ; Electronic mail systems Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: QuickSteps in Outlook is ideal for personalised and on-the-spot email handling. We'll explore the often-overlooked QuickSteps group on the Home tab, revealing the power to create and execute personalised actions for more efficient inbox management. Unlike rules that apply broadly, QuickSteps empower you to perform targeted actions on individual emails at your discretion. By the end of this lesson, you'll have the skills to create and utilise QuickSteps in Outlook, transforming how you manage your emails. Say hello to a more tailored Outlook experience that aligns with your unique workflow. Join us to make your email management more personalised and efficient.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (8 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.5/8
    Keywords: Microsoft PowerPoint (Computer file) ; Presentation graphics software ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This lesson will guide you through using Morph transitions to craft a visually stunning spotlight effect, allowing you to highlight crucial elements in PowerPoint. Learn how to morph objects, text, and shapes to make your slides more dynamic and engaging. We’ll explore shaping and colouring as well as outlining and glowing effects. You’ll learn to transform static slides into a vibrant showcase, making your presentations more visually impressive.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (3 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.5/8
    Keywords: Microsoft PowerPoint (Computer file) ; Microsoft Forms ; Social surveys ; Presentation graphics software ; Enquêtes sociales ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Discover the power of combining Microsoft Forms with PowerPoint to collect real-time responses from your audience and display them directly on your presentation slides. This lesson guides you through the simple process of creating engaging surveys, quizzes, and polls using Forms. Learn how to insert these forms into your PowerPoint slides effortlessly, allowing your audience to participate and vote live during your presentation. With the bonus of a QR code feature, your audience can easily access and contribute to the feedback session using their smartphones. Transform your presentations into an interactive and dynamic experience.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Explore advanced data validation techniques, features and Excel's data validation capabilities in this lesson. While dropdown lists are commonly used to control data entry, in this lesson we will demonstrate how to integrate input messages and error alerts. Learn how to provide helpful hints with custom input messages, guiding users on what to select from the dropdown list. Moreover, master the art of error alerts that warn against invalid inputs, ensuring data integrity and preventing mistakes. Whether you're managing a team-shared spreadsheet or simply want to elevate your data validation skills, this lesson unlocks the full potential of Excel's capabilities, making your spreadsheets more user-friendly and error-resistant.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This lesson shares essential tips and tricks for effectively managing large datasets, focusing specifically on printing. Whether you're dealing with extensive tables or spreadsheets, printing can sometimes pose challenges, and we're here to guide you through the process. We’ll establish how to adjust print settings and change from portrait to landscape to accommodate more columns on a page. Additionally, we'll uncover a handy trick to ensure that column headings are consistently printed on every page. We'll also address what to do when you only need to print a specific subset of your dataset. We'll cover methods like setting print areas and selecting particular rows to print. Join us to master the art of printing large datasets to make your data more accessible and visually appealing.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (3 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Bar coding ; Electronic spreadsheets Computer programs ; Business Computer programs ; Codes à barres ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Learn to create barcodes using Excel. This lesson will guide you through turning product IDs into barcodes. We'll introduce you to the Libre Barcode 39 font and the share steps to customise your barcode. Unlock the potential of barcode creation by exploring font options. This lesson encourages you to explore different options based on your unique product requirements. Establish how to create barcodes and add to your Excel toolkit.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Discover a unique option that adds a touch of magic to your charts. Picture a pearl chart created by stacking colourful circles representing data points. No matter what you need to create one for, the possibilities are endless. Learn how to format your chart, add custom elements like coloured circles, and add the stacking feature. With practical insights and useful tips, you'll witness how easy adjustments can turn a simple chart into an engaging visual representation.
    Note: Online r esource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (6 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; ChatGPT ; Artificial intelligence Computer programs ; Electronic spreadsheets Computer programs ; Business Computer programs ; Intelligence artificielle ; Logiciels ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This lesson explores the effective use of ChatGPT to effortlessly create diverse datasets. Learn how to interact with ChatGPT to instruct it to generate specific datasets, whether it's a 100-row sales dataset or a customised HR dataset with specific fields. While ChatGPT can be a helpful tool, this lesson covers some of its limitations. It establishes how to overcome challenges, such as generating larger datasets, and shares practical tips for refining prompts to achieve optimal results. Learning Objectives Establish how to use ChatGPT to generate diverse practice datasets and supercharge your productivity.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; ChatGPT ; Artificial intelligence ; Electronic spreadsheets Computer programs ; Business Computer programs ; Intelligence artificielle ; Tableurs ; Logiciels ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This lesson explores how ChatGPT can be used to generate formulas. It emphasises practicality by applying the generated formula to a real-world scenario. It’ll show the balance of human expertise and AI assistance. We’ll demonstrate using ChatGPT to create an XLOOKUP formula. We’ll guide you through constructing a prompt tailored to your dataset. We’ll acknowledge ChatGPT’s usefulness while underlining that optimal results come from having an understanding of Excel and being able to spot errors.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This is a guide to making your data bars a precise and powerful tool for effective data communication. Explore the power of data bars for representing values more effectively. This lesson demonstrates how to use data bars efficiently, making it so much easier to interpret and communicate insights. We’ll navigate through practical examples and share essential keyboard shortcuts. We’ll look at customisation options that go beyond the default settings. Discover advanced techniques such as protecting sensitive information and fine-tuning the length of data bars based on percentage or specific numerical ranges.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets ; Business Computer programs ; Tableurs ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Have you ever needed to quickly find data based on two distinct conditions? This one’s for you. Get the most out of Excel's XLOOKUP function and learn about two-way lookups with multiple criteria. We’ll introduce a scenario involving sales data spread across months, showing how XLOOKUP handles a two-way lookup. We’ll examine named ranges and data validation dropdowns too. We’ll use practical examples to support your learning and enhance your spreadsheet proficiency. Finding the data you need doesn’t have to be a challenge.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    [Place of publication not identified] : Pragmatic AI Solutions
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 59 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3
    Keywords: Amazon Web Services (Firm) ; Artificial intelligence Computer programs ; Application software ; Artificial intelligence ; Intelligence artificielle ; Logiciels ; Logiciels d'application ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: GenAI and LLMs on AWS Learn to build machine learning pipelines leveraging large language models on AWS for natural language processing and generative AI. In this hands-on course, you will gain skills to: * Set up cloud-based Rust development environments * Construct serverless workflows with AWS Lambda and Step Functions * Generate text and code with models like Claude and CodeWhisperer * Orchestrate models and data workflows with Amazon Bedrock * By completing real-world coding projects, you will be prepared to operationalize LLMs for machine learning applications. Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification Rust Bootcamp Python Bootcamp Google Professional Machine Learning Engineer Course 2023 (Rough Draft) Rust Data Engineering Building with the GitHub EcoSystem: Copilot, CodeSpaces, and GitHub Actions Microsoft Azure Fundamentals (AZ-900) Certification Google Professional Cloud Architect Certification Course 2023 (Rough Draft) AWS Solutions Architect Professional (SAP-C02) 2023.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 5, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138177652 , 0138177651
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 24 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/1
    Keywords: Deep learning (Machine learning) ; Machine learning ; Apprentissage profond ; Apprentissage automatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    [Shelter Island, New York] : Manning Publications
    Language: English
    Pages: 1 online resource (1 video file (5 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Python (Computer program language) Juvenile films ; Computer programming Juvenile films ; Python (Langage de programmation) ; Films pour la jeunesse ; Programmation (Informatique) ; Films pour la jeunesse ; children's films ; Instructional films ; Children's films ; Nonfiction films ; Internet videos ; Films de formation ; Films pour enfants ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: A Pythonic Adventure teaches you to code by asking questions, making errors, and trying out different solutions—just like in real life. As you go, you’ll create a web application for a coffee shop step-by-step, from your first online menu to saving orders in a database. And this unique tutorial goes deeper than other beginner books. You’ll learn and practice important skills like planning applications, finding bugs, and managing user expectations.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    [Shelter Island, New York] : Manning Publications
    Language: English
    Pages: 1 online resource (1 video file (7 hr., 56 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/82
    Keywords: Cloud computing ; Observers (Control theory) ; Observabilité (Théorie de la commande) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Cloud Observability in Action gives you the background and techniques you need to successfully introduce observability into cloud-based serverless and Kubernetes environments. In it, you’ll learn to use open standards and tools like OpenTelemetry, Prometheus, and Grafana to build your own observability system and end reliance on proprietary software. You’ll discover insights from different telemetry signals, including logs, metrics, traces, and profiles. Plus, the book’s rigorous cost-benefit analysis ensures you’re getting a real return on your observability investment.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    [Place of publication not identified] : Manning Publications
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 10 min.)) , sound, color.
    Edition: Video edition.
    DDC: 006.3
    Keywords: Artificial intelligence ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Generative AI tools like ChatGPT are amazing--but how will their use impact our society? This book introduces the world-transforming technology and the strategies you need to use generative AI safely and effectively. Introduction to Generative AI gives you the hows-and-whys of generative AI in accessible language. In this easy-to-read introduction, you'll learn: How large language models (LLMs) work How to integrate generative AI into your personal and professional workflows Balancing innovation and responsibility The social, legal, and policy landscape around generative AI Societal impacts of generative AI Where AI is going Anyone who uses ChatGPT for even a few minutes can tell that it's truly different from other chatbots or question-and-answer tools. Introduction to Generative AI guides you from that first eye-opening interaction to how these powerful tools can transform your personal and professional life. In it, you'll get no-nonsense guidance on generative AI fundamentals to help you understand what these models are (and aren't) capable of, and how you can use them to your greatest advantage. About the Technology Generative AI tools like ChatGPT, Bing, and Bard have permanently transformed the way we work, learn, and communicate. This delightful book shows you exactly how Generative AI works in plain, jargon-free English, along with the insights you'll need to use it safely and effectively. About the Book Introduction to Generative AI guides you through benefits, risks, and limitations of Generative AI technology. You'll discover how AI models learn and think, explore best practices for creating text and graphics, and consider the impact of AI on society, the economy, and the law. Along the way, you'll practice strategies for getting accurate responses and even understand how to handle misuse and security threats. What's Inside How large language models work Integrate Generative AI into your daily work Balance innovation and responsibility About the Reader For anyone interested in Generative AI. No technical experience required. About the Authors Numa Dhamani is a natural language processing expert working at the intersection of technology and society. Maggie Engler is an engineer and researcher currently working on safety for large language models. The technical editor on this book was Maris Sekar. Quotes Essential for anyone eager to understand or work with this transformative technology. - Ron Green, Co-Founder & CTO, KUNGFU.AI Become an active participant in the conversation on the societal implications of generative AI. A must read! - Edgar Markevicius, Meta Clear and compelling. I highly recommend this book to anyone interested in generative AI and its impact on the world. - Kenneth R. Fleischmann, Founding Chair of Good Systems: Ethical AI at UT Austin Perfect. I can think of no defter guides to Generative AI and the promise and peril it portends. - Dr. Daniel Rogers, The Global Disinformation Index.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The Advanced Filter feature provides an alternative to the more commonly used dropdown menus and the FILTER function. This lesson guides you through the steps of using the Advanced Filter to extract specific data based on criteria. While it proves effective in isolating desired information, we also address a drawback – the lack of automatic updates for changed criteria. However, we offer a quick solution: creating a user-friendly macro and assigning it to a button for seamless data refresh, making the Advanced Filter even more accessible and efficient. Whether you're a seasoned Excel user or just starting, this lesson is a valuable addition to your toolkit.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (6 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: While many of us are familiar with the MIN and MAX functions, LARGE and SMALL offer a unique twist to data analysis. This lesson provides a step-by-step guide to help you maximise your Excel expertise. We demonstrate how LARGE and SMALL functions work seamlessly. We also explore combining these functions with XLOOKUP. If you're ready to elevate your Excel game and extract precisely the data you need, this lesson is for you. We’ll explore the LARGE and SMALL functions – Excel's hidden gems for refined data analysis.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (3 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.5/7
    Keywords: Microsoft Outlook ; Electronic mail systems ; Business Computer programs ; Personal information management Computer programs ; Electronic mail messages ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Discover the functionality of Outlook's Search Folders in this lesson. Learn how to create folders with different criteria and make email management efficient. We'll guide you through organising emails, flagging messages for follow-up, and managing large emails. In just a few clicks, you can transform your workflow and supercharge your success. Join us to boost your productivity — make your Outlook inbox work smarter for you and streamline your email management.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This lesson explains the process of breaking up information contained in a single cell into separate columns using Text to Columns. This technique is invaluable for enhancing clarity and organisation when dealing with product details, lists, or any other data. It ensures you can efficiently manage and present information in a more structured and visually appealing way. By the end of the lesson, you’ll be able to navigate Excel's Data Tab, understand the functionalities of Text to Columns, and confidently apply this valuable technique to streamline and elevate your data management capabilities.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (6 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This lesson explores practical methods for converting data efficiently. We examine the CONVERT function in Excel, demonstrating how simple it is to switch between units. By following our step-by-step guide, you'll see how to seamlessly convert data and unlock the potential of the CONVERT function for various transformations, such as changing centimetres to feet, celsius to Fahrenheit or stones to kilograms. This lesson extends to currency conversion, showcasing another method using Microsoft 365's Data Types. We’ll guide you through creating a table, applying data types, and utilising live data to track exchange rates.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (9 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: While VLOOKUP may seem like old news, it remains a powerhouse in data analysis. This lesson focuses on the often misunderstood approximate match argument. You'll learn the details of VLOOKUP, tackling lookup values, table arrays, column indices, and the pivotal choice between an exact match and an approximate match. This lesson equips you with the skills to use VLOOKUP effectively, making your data work for you.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835465462 , 1835465463
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.7
    Keywords: Web site development ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Dive into the freelancing world with this course that bridges the theoretical and practical aspects of web development. This course is designed for aspiring freelancers and seasoned developers looking to expand their skill set with hands-on, project-based learning. You will embark on a journey to build a fully functional website for a surfcamp, complete with an integrated, customizable blog and sign-up forms, using NextJS and Strapi. This course stands out by focusing on real-world projects, avoiding generic examples and diving deep into the synergy of NextJS and Strapi for a flexible design and seamless developer experience. Learn how to deliver websites to clients who lack coding skills, allowing them to update content directly, rivaling the convenience of platforms like WordPress, Squarespace, and Wix with the power of a Headless CMS. From design to deployment, you will transform Figma designs into live sites, mastering the art of a seamless design-to-development workflow. With over 12 hours of content, the curriculum introduces new concepts at a comfortable pace, ensuring a comprehensive understanding of each element.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835466445 , 1835466443
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 10 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) Administration ; Systèmes d'exploitation (Ordinateurs) ; Administration ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying a solid foundation with the basics of installing Linux as a server, guiding you through both initial setup and advanced configurations. It emphasizes the importance of security from the outset, detailing steps for hardening your Linux server against threats and ensuring safe remote access via SSH. The journey continues with configuring system logging, monitoring performance, and navigating networking fundamentals to advanced techniques, providing a holistic view of server management. The course focuses on essential server services and management techniques, including managing DNS with BIND, deploying DHCP and HTTP services, and securing communications with SSL. It also covers database management with MariaDB, offering insights into installation and data handling, and extends into file sharing and web services with Samba, NFS, and FTP/SFTP configurations. These modules not only highlight the technical skills required but also underscore the importance of these services in maintaining a resilient and efficient server environment. The course wraps up by delving into system initialization processes, comparing SysV Init, Upstart, and systemd, ensuring you're well-equipped to manage services and system boot processes.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835887660 , 183588766X
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 35 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Internet of things ; Embedded Internet devices ; Computer networks Security measures ; Tests d'intrusion ; Internet des objets ; Internet intégré ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the world of IoT and its significance in today's tech-driven society, emphasizing the importance of security in this interconnected environment. It covers the spectrum of IoT targets and the necessity of robust security measures to protect them. The course focuses on practical skills, including the use of hardware components like multimeters, TTL to USB, and JTAGulators, as well as software tools such as terminal emulators, Binwalk, and QEMU. You will learn about firmware analysis, including acquisition, extraction, and emulation, alongside techniques for exploiting embedded operating systems, network services, and IoT web applications. The course wraps up by guiding you through hands-on practices for identifying hardware vulnerabilities, automating UART pin identification, and gaining device access, ensuring you have the knowledge to perform comprehensive pentests on IoT devices.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835889244 , 1835889247
    Language: English
    Pages: 1 online resource (1 video file (11 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Computer security ; Tests d'intrusion ; Sécurité informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course unfolds with a comprehensive introduction to cybersecurity, spanning essential topics like online safety, ethics, and current events. Delving deeper, participants explore core principles, including the CIA Triad, threats, and vulnerabilities. From fundamental to advanced levels, the course covers cybersecurity techniques with hands-on experience in both Microsoft Windows and Linux environments. Navigating through networking basics, Microsoft Windows history, and security tools, the course emphasizes account management, security policies, and tools. A thorough examination of Ubuntu and Linux security, encompassing both graphical and command-line interfaces, ensures a well-rounded understanding. The course continues by unraveling the intricacies of computer operations, virtualization, and performance monitoring. Introducing Linux and Ubuntu, the course covers command-line usage, security measures, and advanced techniques. In the final stretch, you will explore ethical hacking tools and techniques, developing critical security analysis and incident response skills. The course concludes with advanced Ubuntu security, providing a comprehensive skill set for tackling evolving cyber threats. What you will learn Grasp the CIA Triad principles Implement basic and advanced cybersecurity techniques Navigate Microsoft Windows and MSDN Understand Linux and Ubuntu fundamentals Apply ethical hacking tools and techniques Develop critical incident response skills Audience This course is ideal for students and professionals seeking to excel in cybersecurity. A basic understanding of computer basics is recommended. Perfect for those aspiring to enhance their skills and adapt to the evolving landscape of cybersecurity. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Steve Linthicum: Steven W. Linthicum was a professor of computer science at Sierra College in Rocklin, California, retiring from his role in June 2017. Steve continues to teach and support other community college faculty in a variety of classes that focus on network administration, information assurance and security, and virtualization/cloud technologies. Steve has always been on the leading edge of technology, holding a variety of industry certifications issued by major industry leaders like Microsoft, VMware, CompTIA, ISC2, EMC, and Citrix. Cherokee Boose: Cherokee Boose started as a computer technician and moved to a network administrator role. Her love for learning is what pushed her towards a career in IT education. Certifications: MCSE Cloud Platform and Infrastructure; MCSA: Server 2012; MCT; MCP; MTA: Networking Fundamentals; MTA: Windows Operating System Fundamentals; Six Sigma Green Belt; CompTIA A+, A+ CE, Network+, CTT+, and Cloud+.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    [Shelter Island, New York] : Manning Publications
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 39 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Computer multitasking ; Fonctionnement multitâche ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Perplexed by concurrency? Don’t be. This engaging, fully-illustrated beginner’s guide gets you writing the kind of high-performance code your apps deserve. Inside, you’ll find thorough explanations of concurrency’s core concepts—all explained with interesting illustrations, insightful examples, and detailed techniques you can apply to your own projects. Grokking Concurrency is a perfectly paced introduction to the fundamentals of concurrent, parallel, and asynchronous programming. In it, you’ll learn the practices you’ll need to program multicore processors, GPUs, and other high-performance systems. Author Kirill Bobrov skips the math, jargon, and academic language and concentrates on clear, plain-English explanations.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    [Shelter Island, New York] : Manning Publications
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.30285/436
    Keywords: Kubernetes ; Electronic data processing Distributed processing ; Machine learning ; Traitement réparti ; Apprentissage automatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Distributing machine learning systems allow developers to handle extremely large datasets across multiple clusters, take advantage of automation tools, and benefit from hardware accelerations. This book reveals best practice techniques and insider tips for tackling the challenges of scaling machine learning systems. Inside Distributed Machine Learning Patterns you’ll learn to apply established distributed systems patterns to machine learning projects—plus explore cutting-edge new patterns created specifically for machine learning. Firmly rooted in the real world, this book demonstrates how to apply patterns using examples based in TensorFlow, Kubernetes, Kubeflow, and Argo Workflows. Hands-on projects and clear, practical DevOps techniques let you easily launch, manage, and monitor cloud-native distributed machine learning pipelines. Distributed Machine Learning Patterns provides dozens of techniques for designing and deploying distributed machine learning systems. In it, you’ll learn patterns for distributed model training, managing unexpected failures, and dynamic model serving. You’ll appreciate the practical examples that accompany each pattern along with a full-scale project that implements distributed model training and inference with autoscaling on Kubernetes.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Unlock the power of Custom Formatting in Excel as we guide you through transforming your data with style. Discover how to add colour, symbols, and flair to your spreadsheet. In this lesson, we'll explore custom formatting, and you’ll learn how to transform your data presentation from ordinary to extraordinary. Whether you're a beginner or an advanced user, this course is designed to empower you with the skills needed to create visually stunning and insightful spreadsheets.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This lesson explores the process of adding a dynamic Search Box to an Excel spreadsheet. Whether you're managing a vast dataset or something smaller, this lesson will guide you through creating a Search Box that performs both full and partial matches to highlight corresponding information. We'll utilise form controls, conditional formatting, and a carefully crafted formula to achieve this interactive functionality. Effortlessly enhance your Excel spreadsheets with the practical search feature that dynamically highlights relevant entries, making data exploration in Excel so much simpler.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (3 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This lesson showcases efficient data organisation with WrapRows. It provides insights for both Microsoft 365 users and those on other Excel versions. We'll address the need to split a dataset into distinct columns with a streamlined approach and uncover how to utilise the WrapRows function, leveraging the latest Excel functions. You’ll become familiar with practical shortcuts and commands to simplify your data management process and elevate your Excel skills.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This lesson examines calculation methods. If terms like AVERAGE function and SUMPRODUCT have left you confused, fear not – our step-by-step guide is here to simplify things for you. We start by demonstrating how to find a regular average using the AVERAGE function. However, the real game-changer comes when you explore the nuances of weighted averages, where certain disciplines hold more weight than others. We break down the process of assigning percentage-based weight values. Whether you're a beginner or an experienced Excel user, this lesson will ensure you confidently grasp the details of weighted averages.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Ever wondered how to seamlessly integrate a data validation dropdown list with dynamic images in Excel? Look no further! This lesson will guide you through selecting criteria from a dropdown and making the corresponding images dynamically appear in your worksheet. We’ll explore creating a polished data validation dropdown and linking it with carefully aligned images. You’ll learn how to create named ranges and employ the Indirect formula for dynamic image referencing. Elevate your spreadsheet game and add a dash of creativity to your data validation process.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (9 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This lesson will debunk common misconceptions and showcase the potential of Excel tables. Discover the ease of transforming your raw data into a table using various methods, and learn how tables enhance data manipulation. Establish the benefits of automatic formula replication and easy reference naming. We’ll explore features like dynamic expansion, ensuring your charts automatically adapt to growing datasets. Optimise your Excel experience and make Excel tables your most valuable asset for data analysis and presentation.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (9 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.5/8
    Keywords: Microsoft PowerPoint (Computer file) ; Presentation graphics software ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This lesson explores the features of PowerPoint's Slide Zoom functionality. Slide Zoom makes your content much more appealing to your audience and enhances their experience. From half-screen image magic to personalised zoom styles, you’ll learn how to create presentations that stand out with vibrant visuals and morphing transitions. With customisable thumbnails and interactive features, you'll be able to transform your slideshows into captivating experiences.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (6 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Microsoft Forms ; Electronic spreadsheets Computer programs ; Social surveys ; Business Computer programs ; Tableurs ; Logiciels ; Enquêtes sociales ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: If you've ever used Microsoft Forms in your Microsoft 365, you know the convenience of collecting responses and exporting them to Excel for analysis. However, a common issue arises when the exported Excel file doesn't automatically update with new responses, leading to potential data discrepancies. In this lesson, we'll walk you through the problem and provide a solution that ensures your Excel file stays up-to-date seamlessly. We'll guide you through an alternative approach using OneDrive to create your form. By doing so, you'll learn how to set up a dynamic Excel file that automatically incorporates new data as it is submitted. Say goodbye to the hassle of manual exports, and join us to streamline your data analysis process with Microsoft Forms and Excel!
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: In this lesson, we'll be exploring two dynamic functions that are making waves in the world of data manipulation: TOCOL and TOROW. These functions, currently exclusive to Microsoft 365, introduce innovative ways to reshape and present data. We'll guide you through practical examples to demonstrate the power and versatility of these functions. First up is TOCOL, a function designed to effortlessly switch data from a row to a column format. With a straightforward syntax and optional arguments, TOCOL allows for seamless customization of data arrays. We'll also explore TOROW, a companion function that horizontally aligns data, providing an alternative perspective. Enhance your data manipulation skills and prepare for the evolving landscape of spreadsheet tools.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: If you're a Microsoft 365 user or use Excel for the web, this lesson is for you – the IMAGE function is exclusive to these versions. We explore the application of the IMAGE function to import company logos into your spreadsheet. Use the IMAGE function to dynamically fetch company logos using URLs. Learn how to concatenate cell references, incorporate website URLs, and enhance your spreadsheet with this function. This lesson shares how to leverage the IMAGE function's capabilities, so watch, learn, and elevate your Excel game.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (6 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Discover the power of data validation and conditional formatting with our comprehensive lesson on creating dynamic dropdown lists in Excel. This lesson will guide you through setting up a user-friendly interface that automatically highlights corresponding rows in a table. We’ll provide step-by-step instructions on using formulas, data validation, and conditional formatting to enhance your Excel skills. Discover how to organise your data by creating a table, giving it a name for easy reference, and generating a unique list using the UNIQUE function. Don't worry if you don't have access to the UNIQUE function – we've got you covered with an alternative method.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (6 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Ever wished for the eyedropper tool, commonly found in PowerPoint, to be available in Excel? Well, this one’s for you. This lesson explores the Colour Picker feature in Excel. You can pick colours from one element and apply them consistently across your spreadsheet. We’ll guide you through the installation process, highlight the tool’s capabilities, and even provide an easy shortcut for quick access – all to maintain consistent colours across your charts and shapes in Excel.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This lesson will support you in performing complex two-way lookups with ease. We’ll explore the mechanics of the two-way lookup using the combination of INDEX and MATCH functions. The INDEX function will help us retrieve the sales value from the specified array, while the MATCH function will allow us to find the positions of the selected company and month within their respective lists. Combining these functions makes our formula flexible enough to handle various combinations, ensuring accurate and efficient data retrieval.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (3 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Business Computer programs ; Electronic spreadsheets ; Tableurs ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: If you've ever imported data from the web and found pesky wildcard characters like asterisks messing with your cell contents, this lesson is your solution. We'll demonstrate how to locate and replace wildcard characters efficiently. Using the standard Find and Replace might seem straightforward, but there's a catch – the asterisk (*) is a wildcard character in Excel. Clicking ""Replace All"" with the asterisk alone will erase everything in the cell, as the wildcard denotes ""all."" We've got a simple trick for you. We can precisely target and replace just the unwanted character. Learn this clever technique and save yourself from data cleanup frustration.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Business Computer programs ; Electronic spreadsheets ; Tableurs ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: A standard VLOOKUP has its limitations. XLOOKUP offers additional search options but fails to provide the desired result. This lesson presents a familiar scenario involving a table with employee names, departments, and countries of residence, showcasing the complexity of traditional lookup functions when faced with duplicates. By combining multiple pieces of information, such as employee names and departments, we create a unique identifier for each record. Using this approach with XLOOKUP, we successfully achieve accurate lookups - highlighting the importance of finding unique identifiers when dealing with duplicate values in your data sets. Join us in mastering this essential skill for effective data management! Learning Objectives Perform accurate lookups in tables with duplicate values by creating unique identifiers - ensuring precision in data retrieval and management.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc.
    Language: Undetermined
    Pages: 1 online resource (1 video file)
    DDC: 005.1
    Keywords: Git (Computer file) ; Computer software Development ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The landscape of programming is evolving with the growing importance of AI-assisted tools, and GitHub Copilot is at the forefront of this change, with over 1.3 million paid users. This collection of videos offers a practical approach to learning this valuable application, delving into key areas such as prompt engineering, the intricacies of refactoring, understanding regular expressions (regex), and the fundamentals of unit testing. You'll also gain hands-on experience through practical demonstrations, including the creation of a weather app.
    Note: Machine-generated record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc.
    Language: Undetermined
    Pages: 1 online resource (1 video file)
    DDC: 005.1
    Keywords: Git (Computer file) ; Computer software Development ; Computer software Testing ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The landscape of programming is evolving with the growing importance of AI-assisted tools, and GitHub Copilot is at the forefront of this change, with over 1.3 million paid users. This collection of videos offers a practical approach to learning this valuable application, delving into key areas such as prompt engineering, the intricacies of refactoring, understanding regular expressions (regex), and the fundamentals of unit testing. You'll also gain hands-on experience through practical demonstrations, including the creation of a weather app.
    Note: Machine-generated record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc.
    Language: Undetermined
    Pages: 1 online resource (1 video file)
    DDC: 005.1
    Keywords: Git (Computer file) ; Computer software Development ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The landscape of programming is evolving with the growing importance of AI-assisted tools, and GitHub Copilot is at the forefront of this change, with over 1.3 million paid users. This collection of videos offers a practical approach to learning this valuable application, delving into key areas such as prompt engineering, the intricacies of refactoring, understanding regular expressions (regex), and the fundamentals of unit testing. You'll also gain hands-on experience through practical demonstrations, including the creation of a weather app.
    Note: Machine-generated record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc.
    Language: Undetermined
    Pages: 1 online resource (1 video file)
    DDC: 005.1
    Keywords: Git (Computer file) ; Computer software Development ; Coding theory ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The landscape of programming is evolving with the growing importance of AI-assisted tools, and GitHub Copilot is at the forefront of this change, with over 1.3 million paid users. This collection of videos offers a practical approach to learning this valuable application, delving into key areas such as prompt engineering, the intricacies of refactoring, understanding regular expressions (regex), and the fundamentals of unit testing. You'll also gain hands-on experience through practical demonstrations, including the creation of a weather app.
    Note: Machine-generated record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc.
    Language: Undetermined
    Pages: 1 online resource (1 video file)
    DDC: 005.1
    Keywords: Git (Computer file) ; Computer software Development ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The landscape of programming is evolving with the growing importance of AI-assisted tools, and GitHub Copilot is at the forefront of this change, with over 1.3 million paid users. This collection of videos offers a practical approach to learning this valuable application, delving into key areas such as prompt engineering, the intricacies of refactoring, understanding regular expressions (regex), and the fundamentals of unit testing. You'll also gain hands-on experience through practical demonstrations, including the creation of a weather app.
    Note: Machine-generated record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc.
    Language: Undetermined
    Pages: 1 online resource (1 video file)
    DDC: 005.1
    Keywords: Git (Computer file) ; Computer software Development ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The landscape of programming is evolving with the growing importance of AI-assisted tools, and GitHub Copilot is at the forefront of this change, with over 1.3 million paid users. This collection of videos offers a practical approach to learning this valuable application, delving into key areas such as prompt engineering, the intricacies of refactoring, understanding regular expressions (regex), and the fundamentals of unit testing. You'll also gain hands-on experience through practical demonstrations, including the creation of a weather app.
    Note: Machine-generated record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc.
    Language: Undetermined
    Pages: 1 online resource (1 video file)
    DDC: 005.1
    Keywords: Git (Computer file) ; Computer software Development ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The landscape of programming is evolving with the growing importance of AI-assisted tools, and GitHub Copilot is at the forefront of this change, with over 1.3 million paid users. This collection of videos offers a practical approach to learning this valuable application, delving into key areas such as prompt engineering, the intricacies of refactoring, understanding regular expressions (regex), and the fundamentals of unit testing. You'll also gain hands-on experience through practical demonstrations, including the creation of a weather app.
    Note: Machine-generated record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson
    ISBN: 9780138361600 , 0138361606
    Language: Undetermined
    Pages: 1 online resource (1 video file)
    DDC: 005.8
    Keywords: Artificial intelligence Computer programs ; Security measures ; Computer networks Security measures ; Natural language generation (Computer science) ; Intelligence artificielle ; Logiciels ; Sécurité ; Mesures ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Génération automatique de texte ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Ethical development and responsible deployment of AI and ML systems. Learn the latest technology in AI and ML security to safeguard against AI attackers and ensure data integrity and user privacy. Navigate privacy and ethical considerations to gain insights into responsible AI practices and address ethical consideration. Explore emerging trends and future directions in AI, ML, security, ethics, and privacy focusing on key concepts including threats, vulnerabilities, and attack vectors. Recognize and understand the privacy aspects of AI and ML, including data protection, anonymization, and regulatory compliance Get the essential skills to protect your AI system against cyber attacks. Explore how generative AI and LLMs can be harnessed to secure your projects and organizations against AI cyber threats. Develop secure and ethical systems while being mindful of privacy concerns with real-life examples that we use on a daily-basis with ChatGPT, GitHub Co-pilot, DALL-E, Midjourney, DreamStudio (Stable Diffusion), and others. Gain a solid foundation in AI and ML principles and be better prepared to develop secure and ethical systems while being mindful of privacy concerns. Authors Omar Santos and Dr. Petar Radanliev are industry experts to guide and boost your AI security knowledge. Related Learning: Sign up for live training classes by Omar Santos. Read Beyond the Algorithm: AI, Security, Privacy, and Ethics by Omar Santos and Petar Radanliev. About the Instructors: Omar Santos is a Distinguished Engineer at Cisco focusing on artificial intelligence (AI) security, cybersecurity research, incident response, and vulnerability disclosure. He is a board member of the OASIS Open standards organization and the founder of OpenEoX. Omar's collaborative efforts extend to numerous organizations, including the Forum of Incident Response and Security Teams (FIRST) and the Industry Consortium for Advancement of Security on the Internet (ICASI). Omar is the co-chair of the FIRST PSIRT Special Interest Group (SIG). Omar is the lead of the DEF CON Red Team Village and the chair of the Common Security Advisory Framework (CSAF) technical committee. Omar is the author of more than 25 books, 21 video courses, and nore than 50 academic research papers. Omar is a renowned expert in ethical hacking, vulnerability research, incident response, and AI security. His dedication to cybersecurity has made a significant impact on technology standards, businesses, academic institutions, government agencies, and other entities striving to improve their cybersecurity programs. Prior to Cisco, Omar served in the United States Marines focusing on the deployment, testing, and maintenance of Command, Control, Communications, and Computer and Intelligence (C4I) systems. Dr. Petar Radanliev, Department of Engineering Science, University of Oxford. Dr. Radanliev is a highly accomplished and experienced cybersecurity professional with 10+ years of experience in academic and industry settings. He has expertise in cybersecur ity research, risk management, and cyber defense, as well as a track record of excellence in teaching, mentoring, and leading research teams. Technical skills include new and emerging technical cyber/crypto technologies and algorithms, DeFi, blockchain, Metaverse, and quantum cryptography. Petar obtained a PhD at University of Wales in 2014, and continued with postdoctoral research at Imperial College London, University of Cambridge, Massachusetts Institute of Technology, and University of Oxford. His awards include the Fulbright Fellowship in the United States, and the Prince of Wales Innovation Scholarship in the United Kingdom. Skill Level : Intermediate Course requirement: None.
    Note: Machine-generated record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc.
    Language: Undetermined
    Pages: 1 online resource (1 video file)
    DDC: 005.1
    Keywords: Git (Computer file) ; Computer software Development ; Application software Development ; Logiciels d'application ; Développement ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The landscape of programming is evolving with the growing importance of AI-assisted tools, and GitHub Copilot is at the forefront of this change, with over 1.3 million paid users. This collection of videos offers a practical approach to learning this valuable application, delving into key areas such as prompt engineering, the intricacies of refactoring, understanding regular expressions (regex), and the fundamentals of unit testing. You'll also gain hands-on experience through practical demonstrations, including the creation of a weather app.
    Note: Machine-generated record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Manning Publications
    Language: Undetermined
    Pages: 1 online resource (1 video file)
    DDC: 005.13/3
    Keywords: Go (Computer program language) ; Computer programming ; Computer multitasking ; Go (Langage de programmation) ; Programmation (Informatique) ; Fonctionnement multitâche ; computer programming ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Concurrency doesn't need to be confusing. Start writing concurrent code that improves performance, scales up to handle large volumes of data, and takes full advantage of modern multi-processor hardware. Too many developers think concurrency is extremely challenging. Learn Concurrent Programming with Go is here to prove them wrong! This book uses the easy-to-grasp concurrency tools of the Go language to demonstrate principles and techniques, steadily teaching you the best practices of effective concurrency. Techniques learned in this book can be applied to other languages. In Learn Concurrent Programming with Go you will learn how to: Implement effective concurrency for more responsive, higher performing, scalable software Avoid common concurrency problems such as deadlocks and race conditions Manage concurrency using goroutines, mutexes, readers-writer locks, and more Identify concurrency patterns such as pipelining, worker pools, and message passing Discover advantages, limits, and properties of parallel computing Improve your Go coding skills with advanced multithreading topics Concurrent programming allows multiple tasks to execute and interact simultaneously, speeding up performance and reducing user wait time. In Learn Concurrent Programming with Go, you'll discover universal principles of concurrency, along with how to use them for a performance boost in your Go applications. Expert author James Cutajar starts with the basics of modeling concurrency in your programs, demonstrates differences between message passing and memory sharing, and even introduces advanced topics such as atomic variables and futexes. About the Technology You can improve almost any application's performance and responsiveness by introducing concurrency into the codebase. This book will show you how! It starts with the basics of concurrent programming and builds your skills step by step by exploring scenarios you'll face every day as a developer. Author James Cutajar explains each aspect of concurrency in plain language using the intuitive features baked into the Go language. About the Book Learn Concurrent Programming with Go provides a practical, hands-on introduction to creating software for modern multiprocessor systems. In it, you'll learn how to divide larger programming tasks into independent parts that can run simultaneously. You'll use the Go language to implement common concurrency patterns by utilizing readers-writer locks, semaphores, message passing, and memory sharing. The skills you learn will easily transfer to other languages. What's Inside Prevent deadlocks and race conditions Go concurrency features like goroutines, mutexes, channels, and more Concurrency patterns including pipelining and worker pools About the Reader For programmers with basic knowledge of Go or another C-style language. No experience in concurrent programming required. About the Author James Cutajar has been programming for more than 20 years. He's an open source contributor, blogger, tech evangelist, Udemy instructor, and author. Quotes Concurrency is a notoriously difficult, but important, topic. This book will make it all clear! - Allen B. Downey, author of The Little Book of Semaphores, Think Python, and Probably Overthinking It This is the book I was looking for. It explains the necessary building blocks with easy-to-understand examples. Excellent! - Arne Claus, trivago Uncover the beauty of concurrency, where logic dances with elegance. - Jasmeet Singh, Hashicorp A powerhouse of a book! It lays the foundation for understanding concurrency in any language. - Nathan B. Crocker, Galaxy Digital LP.
    Note: Machine-generated record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (9 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Ready to level up your Excel game? This lesson will enhance your efficiency by automating invoice reminders using VBA to create a customised message pop-up box. We'll explore formulas for identifying due and past-due invoices, conditional formatting for visual cues based on reminder status, and VBA code setup for a pop-up message box. By the end of this lesson, you'll have the skills to implement a personalised reminder system in Excel using VBA, helping you stay organised and proactive in managing due dates. Learning Objectives Implement a customised VBA pop-up reminder system in Excel.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 2, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...